US20200380852A1 - Systems and Methods for Semi-Autonomous Individual Monitoring - Google Patents

Systems and Methods for Semi-Autonomous Individual Monitoring Download PDF

Info

Publication number
US20200380852A1
US20200380852A1 US16/937,215 US202016937215A US2020380852A1 US 20200380852 A1 US20200380852 A1 US 20200380852A1 US 202016937215 A US202016937215 A US 202016937215A US 2020380852 A1 US2020380852 A1 US 2020380852A1
Authority
US
United States
Prior art keywords
check
schedule
user
individual
monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/937,215
Other versions
US11164445B2 (en
Inventor
James J. Buck, JR.
Joseph P. Newell
Dustin PETTIT
Mike Cooke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BI Inc
Original Assignee
BI Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US16/937,215 priority Critical patent/US11164445B2/en
Application filed by BI Inc filed Critical BI Inc
Assigned to BI INCORPORATED reassignment BI INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BUCK, JAMES J., JR, COOKE, MIKE, NEWELL, JOSEPH P., PETTIT, Dustin
Publication of US20200380852A1 publication Critical patent/US20200380852A1/en
Priority to US17/495,711 priority patent/US11741821B2/en
Application granted granted Critical
Publication of US11164445B2 publication Critical patent/US11164445B2/en
Assigned to ALTER DOMUS PRODUCTS CORP., AS ADMINISTRATIVE AGENT reassignment ALTER DOMUS PRODUCTS CORP., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: B.I. INCORPORATED, BI MOBILE BREATH, INC.
Assigned to ANKURA TRUST COMPANY reassignment ANKURA TRUST COMPANY PATENT SECURITY AGREEMENT Assignors: B.I. INCORPORATED, BI MOBILE BREATH, INC.
Assigned to CITIZENS BANK, N.A. reassignment CITIZENS BANK, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: B.I. INCORPORATED, BI MOBILE BREATH, INC.
Assigned to B.I. INCORPORATED, BI MOBILE BREATH, INC. reassignment B.I. INCORPORATED RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: ANKURA TRUST COMPANY, LLC
Assigned to ANKURA TRUST COMPANY, LLC reassignment ANKURA TRUST COMPANY, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: B.I. INCORPORATED, BI MOBILE BREATH, INC.
Assigned to B.I. INCORPORATED, BI MOBILE BREATH, INC. reassignment B.I. INCORPORATED RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: ALTER DOMUS PRODUCTS CORP.
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • G01C21/3453Special cost functions, i.e. other than distance or default speed limit of road segments
    • G01C21/3461Preferred or disfavoured areas, e.g. dangerous zones, toll or emission zones, intersections, manoeuvre types, segments such as motorways, toll roads, ferries
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/14Receivers specially adapted for specific applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/0009Transmission of position information to remote stations
    • G01S5/0018Transmission from mobile station to base station
    • G01S5/0027Transmission from mobile station to base station of actual mobile position, i.e. position determined on mobile
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/163Wearable computers, e.g. on a belt
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • G06F1/3209Monitoring remote activity, e.g. over telephone lines or network connections
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • G06F1/3212Monitoring battery levels, e.g. power saving mode being initiated when battery voltage goes below a certain level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • G06F1/3215Monitoring of peripheral devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/3287Power saving characterised by the action undertaken by switching off individual functional units in the computer system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/3296Power saving characterised by the action undertaken by lowering the supply or operating voltage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0258System arrangements wherein both parent and child units can emit and receive
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0269System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0286Tampering or removal detection of the child unit from child or article
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0288Attachment of child unit to child/article
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/22Status alarms responsive to presence or absence of persons
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • H04L67/22
    • H04L67/36
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/0277Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof according to available power supply, e.g. switching off when a low battery condition is detected
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/028Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S2205/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S2205/001Transmission of position information to remote stations
    • G01S2205/002Transmission of position information to remote stations for traffic control, mobile tracking, guidance, surveillance or anti-collision
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S2205/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S2205/001Transmission of position information to remote stations
    • G01S2205/008Transmission of position information to remote stations using a mobile telephone network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • Various embodiments provide systems and method for semi-autonomous monitoring of individuals.
  • Various embodiments provide systems and method for semi-autonomous monitoring of individuals.
  • FIG. 1 a is a block diagram illustrating a hybrid monitoring system including both a user attached monitor device and a user detached monitor device in accordance with various embodiments;
  • FIG. 1 b is a block diagram of a user detached monitor device usable in accordance with one or more embodiments
  • FIG. 1 c is a block diagram of a user attached monitor device including a local communication link in accordance with some embodiments
  • FIG. 1 d shows a user attached monitor device with an attachment element for attaching the user attached monitor device to a limb of an individual in accordance with some embodiments
  • FIG. 2 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes;
  • FIG. 3 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including ambiguity reduction check-in processes;
  • FIG. 4 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device and including use of a user attached monitor device to provide automatic updates;
  • FIG. 5 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device where a conflict is purposely created with a schedule accessed from the user detached monitor device;
  • FIG. 6 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and both a remote monitoring station and a user attached monitoring device including scheduling and check-in processes.
  • Various embodiments provide systems and method for monitoring individuals.
  • Various embodiments disclosed herein provides tools and devices that continue to support the individual as they transition away from the active oversight by, for example, a parole officer.
  • Some embodiments provide monitoring systems that have a monitoring station.
  • the monitoring station includes: a communication apparatus configured to communicate with both a user detached monitor via a first communication link and a user attached monitor via a second communication link and a computer readable medium. Both the user detached monitor and the user attached monitor are associated with an individual being monitored is associated.
  • the computer readable medium includes instructions executable by a processor to: identify a conflict with an original check-in schedule; generate a modified check-in schedule by modifying the original check-in schedule in an aspect related to the conflict; upload the modified check-in schedule to a combination of the user detached monitor and the user attached monitor; receive check-in information from at least one of the user detached monitor or the user attached monitor; and determine if the check-in information complies with the check-in schedule.
  • the computer readable medium further includes instructions executable by the processor to receive one or more check-in windows associated with two or more check-in times in the original check-in schedule. Identifying the conflict with the original check-in schedule includes: determining that an end of a check-in window for a first check-in time is within a defined time period of a beginning of a check-in window for a second check-in time, and indicating the conflict.
  • Modifying the original check-in schedule in an aspect related to the conflict includes one or more of: removing one of the first check-in time or the second check-in time from the original check-in schedule, reducing the check-in window of the first check-in time in the original check-in schedule, or reducing the check-in window of the second check-in time in the original check-in schedule.
  • the system includes the user detached monitor
  • the instructions that identify the conflict with the original check-in schedule includes instructions executable by the processor to: access an individual schedule from the user detached monitor; compare the individual schedule with the original check-in schedule, wherein the conflict is found where it is determined that an event in the individual schedule overlaps an event in the original check-in schedule; and modifying the original check-in schedule in the aspect related to the conflict includes removing the check-in time corresponding to the conflict to yield the modified check-in schedule as the check-in schedule without the check-in time corresponding to the conflict.
  • the communication apparatus is a first communication apparatus
  • the processor is a first processor
  • the computer readable medium is a first computer readable medium
  • the user detached monitor includes: a second a communication apparatus operable to receive the modified check-in schedule from the monitoring station; and a second computer readable medium.
  • the second computer readable medium includes instructions executable by a second processor to: alert the individual being monitored of a check-in requirement at a time designated by the modified check-in schedule; receive input from the individual being monitored via one or more sensors of the user detached monitor; and upload at least a portion of the input received from the individual being monitored to the monitoring station.
  • the second computer readable medium further includes instructions executable by the second processor to enable the one or more sensors of the user detached monitor.
  • the communication apparatus is a first communication apparatus
  • the processor is a first processor
  • the computer readable medium is a first computer readable medium
  • the user detached monitor includes: a second communication apparatus operable to receive at least a portion of the check-in schedule where the portion of the check-in schedule includes the check-in time corresponding to the conflict, and a second computer readable medium.
  • the second computer readable medium includes instructions executable by a second processor to: receive a request for the individual schedule from the monitoring station; provide the individual schedule to the monitoring station in response to the request; alert the individual being monitored of a check-in requirement at a time designated by the portion of the modified check-in schedule; receive input from the individual being monitored via one or more sensors of the user detached monitor; and upload at least a portion of the input received from the individual being monitored to the monitoring station.
  • the monitoring system further includes the user attached monitor, and the user attached monitor includes: an attachment element configured to attach to a limb of an individual being monitored, a tamper sensor configured to indicate removal of the user attached monitor from the individual being monitored, and a communication circuit.
  • the communication circuit is operable to: receive a portion of the modified check-in schedule including the check-in time corresponding to the conflict; and provide status to the monitoring station without interaction with the individual being monitored in accordance with the portion of the modified check-in schedule.
  • uploading the modified check-in schedule to the combination of the user detached monitor and the user detached monitor includes an upload process selected from a group consisting of: uploading the modified check-in schedule only to the user detached monitor; uploading the modified check-in schedule only to the user attached monitor; and uploading a first portion of the modified check-in schedule to the user attached monitor and uploading a second portion of the modified check-in schedule to the user detached monitor.
  • the user detached monitor includes: a sensor configured to receive input from the individual being monitored; a communication apparatus operable to receive at least a portion of an implemented check-in schedule from a monitoring station via a wireless communication network, a processor, and a computer readable medium including instructions executable by the processor.
  • the implemented check-in schedule includes: at least one check-in window and a corresponding check-in time, and a check-in instruction indicating the check-in time and an action to be performed in relation to the sensor.
  • the computer readable medium includes instructions executable by the processor to: alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule; enable the sensor; receive input from the sensor; and upload the input received from the sensor to the monitoring station.
  • the wireless communication network is a cellular telephone network.
  • the communication apparatus is a first communication apparatus
  • the computer readable medium is a first computer readable medium
  • the processor is a first processor
  • the monitoring system further includes the monitoring station.
  • the monitoring station includes: a second communication apparatus configured to communicate with the user detached monitor via a communication link, and a second computer readable medium.
  • the second computer readable medium including instructions executable by a second processor to: receive an original check-in schedule for the individual being monitored; identify a conflict with the original check-in schedule; modify the original check-in schedule to change an aspect of the original check-in schedule in an aspect related to the conflict to yield the implemented check-in schedule; upload at least the portion of the implemented check-in schedule to the user detached monitor; receive check-in information from the user detached monitor; and determine if the check-in information complies with the portion of the implemented check-in schedule.
  • the second computer readable medium further includes instructions executable by the second processor to receive one or more check-in windows associated with two or more check-in times in the original check-in schedule.
  • identifying the conflict with the check-in schedule includes: determining that an end of a check-in window for a first check-in time is within a defined time period of a beginning of a check-in window for a second check-in time; and indicating the conflict.
  • Modifying the original check-in schedule to change an aspect of the original check-in schedule in an aspect related to the conflict includes one or more of: removing one of the first check-in time or the second check-in time from the check-in schedule, reducing the check-in window of the first check-in time in the check-in schedule, or reducing the check-in window of the second check-in time in the check-in schedule.
  • the instructions that identify the conflict with the original check-in schedule includes instructions executable by the second processor to: access an individual schedule from the user detached monitor; and compare the individual schedule with the original check-in schedule, where the conflict is found where it is determined that an event in the individual schedule overlaps an event in the original check-in schedule.
  • Modifying the original check-in schedule to change an aspect of the original check-in schedule related to the conflict includes removing the check-in time corresponding to the conflict to yield the implemented check-in schedule.
  • the first computer readable medium further includes instructions executable by the first processor to: receive a request for the individual schedule from the monitoring station; and provide the individual schedule to the monitoring station in response to the request.
  • the monitoring system further includes a user attached monitor.
  • the user attached monitor includes: an attachment element configured to attach to a limb of an individual being monitored; a tamper sensor configured to indicate removal of the user attached monitor from the individual being monitored; and a communication circuit.
  • the communication circuit is operable to: receive a portion of the implemented check-in schedule including the check-in time corresponding to the conflict; and provide status to the monitoring station without interaction with the individual being monitored in accordance with the portion of the implemented check-in schedule.
  • the senor is selected from a group consisting of: a camera, an audio sensor; a temperature sensor, and a biometric sensor.
  • the sensor is a biometric sensor.
  • a biometric sensor may be, but is not limited to, a finger print sensor, and/or a retinal scan sensor.
  • the monitoring station includes: a first communication apparatus configured to communicate with a user detached monitor associated with an individual being monitored via a cellular telephone network; and a first computer readable medium.
  • the first computer readable medium includes instructions executable by a first processor to: receive an original check-in schedule for the individual being monitored, where the original check-in schedule includes at least a first check-in time and a first check-in window corresponding to the first check-in time, and a second check-in time and a second check-in window corresponding to a second check-in time; identify an internal conflict within the original check-in schedule, where the conflict occurs where an end of the first check-in window is within a defined time period of a beginning of the second check-in window; and modify the original check-in schedule.
  • Modifying the original check-in schedule includes performing at least one of the following functions to yield an implemented check-in schedule: removing one of the first check-in time or the second check-in time from the check-in schedule; reducing the check-in window of the first check-in time in the check-in schedule; or reducing the check-in window of the second check-in time in the check-in schedule.
  • the first computer readable medium includes instructions executable by a first processor to upload at least the portion of the implemented check-in schedule to the user detached monitor.
  • the user detached monitor includes: a sensor configured to receive input from the individual being monitored; a second communication apparatus operable to receive at least a portion of an implemented check-in schedule from the monitoring station via the cellular telephone network; and a second computer readable medium.
  • the second computer readable medium includes instructions executable by the second processor to: alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule; receive input from the sensor; and upload the input received from the sensor to the monitoring station as check-in information.
  • FIG. 1 a a block diagram illustrates a hybrid monitoring system 100 including both a user attached monitor device 110 and a user detached monitor device 120 in accordance with various embodiments.
  • a local communication link 112 allows for communication between user attached monitor device 110 and user detached monitor device 120 .
  • Local communication link 112 may be any communication link that is capable of transferring information or otherwise communicating between two devices within a relatively short distance of each other.
  • local communication link 112 may be a BlueToothTM communication link.
  • local communication link 112 may be a line of sight infared communication link.
  • local communication link 112 may be a WiFi communication link. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and/or media that may be used to implement local communication link 112 .
  • User detached monitor device 120 is portable, and may be any device that is recognized as being used by or assigned to an individual being monitored, but is not physically attached to the individual being monitored by a tamper evident attaching device.
  • User detached monitor device 120 may be, but is not limited to, a cellular telephone capable of communication with user attached monitor device 110 via local communication link 112 .
  • user attached monitor device 110 is attached to the individual being monitored using a tamper evident attaching device like a strap.
  • User attached monitor device 110 may be, but is not limited to, a tracking device that is attached around the limb of an individual and includes indicators to monitor whether the device has been removed from the individual or otherwise tampered.
  • Hybrid monitoring system 100 further includes a central monitoring station 160 wirelessly coupled to user attached monitor device 110 and user detached monitor device 120 via one or more wide area wireless (e.g., cellular telephone network, Internet via a Wi-Fi access point, or the like) communication networks 150 .
  • a wide area wireless e.g., cellular telephone network, Internet via a Wi-Fi access point, or the like
  • User detached monitor device 120 includes a location sensor that senses the location of the device and generates a location data.
  • the location data may comprise one or more of: global positioning system (“GPS”) data, Assisted GPS (“A-GPS”) data, Advanced Forward Link Trilateration (“AFLT”) data, and/or cell tower triangulation data.
  • GPS global positioning system
  • A-GPS Assisted GPS
  • AFLT Advanced Forward Link Trilateration
  • cell tower triangulation data e.g., cell tower triangulation data
  • GPS Global positioning system
  • user detached monitor device 120 receives location information from three or more GPS satellites 145 a , 145 b , 145 c via respective communication links 130 , 131 , 132 .
  • the aforementioned location data is utilized verify the location of a user associated with user detached monitor device 120 at various points as more fully discussed below.
  • User detached monitor device 120 is considered “ambiguous” because it is not attached to the user in a tamper resistant/evident way, but rather is freely severable from the user and thus could be used by persons other than the target.
  • Various processes discussed herein mitigate the aforementioned ambiguity to yield a reasonable belief that information derived from user detached monitor device 120 corresponds to the target.
  • the location data and/or other data gathered by user detached monitor device 120 is wirelessly transmitted to central monitoring station 160 via wide area wireless network 150 accessed via a wireless link 133 .
  • Central monitoring station 160 may be any location, device or system where the location data is received, including by way of non-limiting example: a cellular/smart phone, an email account, a website, a network database, and a memory device.
  • the location data is stored by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual. In this manner, monitor is able to respond appropriately to the detected out-of-bounds activity by a user.
  • the monitor is able to retrieve the location data via a user interaction system 185 which may be, but is not limited to, a network connected user interface device communicatively coupled via a network to central monitoring station 160 and/or directly to user detached monitor device 120 via wide area wireless network 150 .
  • a user interaction system 185 may be, but is not limited to, a network connected user interface device communicatively coupled via a network to central monitoring station 160 and/or directly to user detached monitor device 120 via wide area wireless network 150 .
  • User detached monitor device 120 may further include a user identification sensor operable to generate user identification data for identifying the user in association with the generation of the location data.
  • the user identification data may comprise one or more of: image data, video data, biometric data (e.g. fingerprint, DNA, retinal scan, etc. data), or any other type of data that may be used to verify the identity of the user at or near the time the location data is generated.
  • the user identification sensor may comprise one or more of: a camera, microphone, heat sensor, biometric data sensor, or any other type of device capable of sensing/generating the aforementioned types of user identification data.
  • the user identification data is wirelessly transmitted in association with the location data to central monitoring station 160 via a wireless transmitter communicatively coupled to the user identification sensor.
  • the user identification data is stored in association with the location data by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual.
  • the monitor is able to retrieve the location data via a network connected user interface device communicatively coupled—via the network—to central monitoring station 160 and/or to user detached monitor device 120 .
  • the location data may be transmitted to central monitoring station 160 independent of the user identification data, for example, during a periodic check-in with central monitoring system 160 .
  • User detached monitor device 120 may further comprise a memory communicatively coupled to a control unit—which is also communicatively coupled to the location sensor, the identification sensor and the wireless transceiver—for controlling the operations thereof in accordance with the functionalities described herein.
  • the memory may include non-transient instructions (e.g., software of firmware based instructions) executable by the control unit to perform and/or enable various functions associated with user detached monitor device 120 .
  • each of the components may be located within, immediately adjacent to, or exposed without, a device housing whose dimensions are such that user detached monitor device 120 as a whole may be discretely carried by the user, for example, within a pocket or small purse.
  • User detached monitor device 120 may include a Wi-Fi transceiver capable of receiving information from one or more Wi-Fi access points 187 that can be used to discern location via a Wi-Fi communication link 114 .
  • Central monitoring station 160 preferably comprises a server supported website, which may be supported by a server system comprising one or more physical servers, each having a processor, a memory, an operating system, input/output interfaces, and network interfaces, all known in the art, coupled to the network.
  • the server supported website comprises one or more interactive web portals through which the monitor may monitor the location of the user in accordance with the described embodiments.
  • the interactive web portals may enable the monitor to retrieve the location and user identification data of one or more users, set or modify ‘check-in’ schedules, and/or set or modify preferences.
  • the interactive web portals are accessible via a personal computing device, such as for example, a home computer, laptop, tablet, and/or smart phone.
  • the server supported website comprises a mobile website accessible via a software application on a mobile device (e.g. smart phone).
  • the mobile website may be a modified version of the server supported website with limited or additional capabilities suited for mobile location monitoring.
  • User attached monitor device 110 includes a location sensor that senses the location of the device and generates a location data.
  • the location data may comprise one or more of: global positioning system (“GPS”) data, Assisted GPS (“A-GPS”) data, Advanced Forward Link Trilateration (“AFLT”) data, and/or cell tower triangulation data.
  • GPS global positioning system
  • A-GPS Assisted GPS
  • AFLT Advanced Forward Link Trilateration
  • cell tower triangulation data e.g., cell tower triangulation data
  • user attached monitor device 110 receives location information from three or more GPS satellites 145 a , 145 b , 145 c via respective communication links 136 , 138 , 139 .
  • the aforementioned location data is utilized to verify the location of a user associated with user attached monitor device 110 at various points as more fully discussed below.
  • User attached monitor device 110 is considered “non-ambiguous” because it is physically attached to the user in a tamper resistant way and as such provides information only about the user to which
  • the location data and/or other data gathered by user attached monitor device 110 is wirelessly transmitted to central monitoring station 160 via a wide area wireless network 150 accessed via a wireless link 135 .
  • Central monitoring station 160 may be any location, device or system where the location data is received, including by way of non-limiting example: a cellular/smart phone, an email account, a website, a network database, and a memory device.
  • the location data is stored by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual. In this manner, monitor is able to respond appropriately to the detected out-of-bounds activity by a user.
  • User attached monitor device 110 may further comprise a memory communicatively coupled to a control unit—which is also communicatively coupled to the location sensor, the identification sensor and the wireless transceiver—for controlling the operations thereof in accordance with the functionalities described herein.
  • the memory may include non-transient instructions (e.g., software of firmware based instructions) executable by the control unit to perform and/or enable various functions associated with user attached monitor device 110 .
  • User attached monitor device may include a strap which can be wrapped around a limb of the individual being monitored to secure user attached monitor device to the individual.
  • the strap includes one or more tamper circuits and/or sensors that allow for a determination as to whether the device has been removed or otherwise tampered.
  • User attached monitor device 110 may include a Wi-Fi transceiver capable of receiving information from one or more Wi-Fi access points 187 that may be used to identify location via a Wi-Fi communication link 113 .
  • User detached monitor device 120 includes wireless transceiver circuitry 128 that is capable of sending and receiving information via wireless link 133 to/from wide area wireless network 150 .
  • Wireless transceiver circuitry 128 may be any circuitry, integrated circuit, and/or processor or controller capable of supporting wireless communication. Such wireless communication may include, but is not limited to, cellular telephone communication, Internet communication via a Wi-Fi access point, or both.
  • user detached monitor device 120 includes a vibrator 112 , a speaker 114 , and a visual display and touch screen 116 .
  • a user of user detached monitor device 120 is alerted of a need to check-in.
  • the schedule of check-in times may be downloaded to a memory 124 by central monitoring station 160 via wireless link 133 .
  • the user may be alerted by one or more of: a visual prompt via visual display and touch screen 116 , an audio prompt via speaker 114 , and a tactile prompt via vibrator 112 .
  • Each of vibrator 112 , speaker 114 , and visual display and touch screen 116 is communicatively coupled to memory 124 and/or a control circuit 122 for controlling the operations thereof.
  • control circuit 122 includes a processor.
  • control circuit 122 is part of an integrated circuit.
  • memory 124 is included in an integrated circuit with control circuit 122 .
  • memory 124 may include non-transient instructions (e.g., software of firmware based instructions) executable by controller circuit 122 to perform and/or enable various functions associated with user detached monitor device 120 .
  • a visual prompt may include, but is not limited to, text, images and/or a combination thereof, or a series of such visual prompts.
  • An audio prompt may include, but is not limited to, one or more different audio prompts, or a series thereof. Each prompt may be stored in memory 124 and retrieved in accordance with the schedule that is also maintained in memory 124 .
  • alerting the user involves a prompt that includes an e-mail or text message generated by central monitoring station 160 (e.g. the server supported website) and transmitted to the e-mail account or cellular phone number corresponding to user detached monitor device 120 .
  • a prompt may include a ‘post’ on the user's ‘wall,’ ‘feed,’ or other social networking privilege.
  • the prompt may comprise an automated or live phone call to the user.
  • User detached monitor device 120 further includes user identification circuitry 179 capable of gathering user identification information from one or more of a microphone 171 , a camera 173 , a temperature sensor 175 , and/or a biometric sensor 177 .
  • user identification circuitry 179 is incorporated in an integrated circuit with control circuit 122 .
  • Microphone 171 is capable of accurately capturing the sound of a user's voice
  • camera 173 is capable of accurately capturing images including, for example, an image of the user's face
  • temperature sensor 175 is capable of accurately capturing an ambient temperature around user detached monitor device 120
  • biometric sensor 177 is capable of accurately capturing biometric data about the user including, but not limited to, a thumb print, a retinal scan, or a breath-based alcohol measurement.
  • user identification circuitry 179 assembles one or more elements of data gathered by microphone 171 , a camera 173 , a temperature sensor 175 , and/or a biometric sensor 177 into a user identification package which is forwarded to central monitoring station 160 via wireless transceiver circuitry 128 .
  • User detached monitor device 120 additionally includes location circuitry 126 .
  • Location circuitry 126 may include one or more of, a GPS processing circuit capable of fixing a location of user detached monitor device 120 using GPS data, and/or a cell tower triangulation processing circuit capable of fixing a location of user detached monitor device 120 using cell tower triangulation data.
  • a local communication link 181 controls communication between user detached monitor device 120 and user attached monitor device 110 .
  • local communication link 181 supports a BlueTooth TM communication protocol and is capable of both receiving information from user attached monitor device 110 and transmitting information to user attached monitor device 110 .
  • Local communication link 181 supports a Wi-Fi communication protocol and is capable of both receiving information from user attached monitor device 110 and transmitting information to user attached monitor device 110 .
  • local communication link 181 supports communication in only a receive or transmit direction. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and information transfer directions that may be supported by local communication link 181 in accordance with different embodiments.
  • FIG. 1 c a block diagram 194 of user attached monitor device 110 including a local communication link 159 in accordance with some embodiments.
  • Local communication link 159 controls communication between user attached monitor device 110 and user detached monitor device 120 .
  • local communication link 159 supports a BlueToothTM communication protocol and is capable of both receiving information from user detached monitor device 120 and transmitting information to user detached monitor device 120 .
  • local communication link 159 supports a Wi-Fi communication protocol and is capable of both receiving information from user detached monitor device 110 and transmitting information to user detached monitor device 110 .
  • local communication link 159 supports communication in only a receive or transmit direction. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and information transfer directions that may be supported by local communication link 159 in accordance with different embodiments.
  • user attached monitor device 110 includes a device ID 161 that may be maintained in a memory 165 , and thus is accessible by a controller circuit 167 .
  • Controller circuit 167 is able to interact with a GPS receiver 162 and memory 165 at times for storing and generating records of successively determined GPS locations.
  • controller circuit 167 is able to interact with a Wi-Fi receiver 188 and memory 165 at times for storing and generating records of successively determined Wi-Fi access point identifications and signal strength.
  • memory 165 may include non-transient instructions (e.g., software of firmware based instructions) executable by controller circuit 167 to perform and/or enable various functions associated with user attached monitor device 110 .
  • Wi-Fi receiver 188 senses the signal provided by the respective Wi-Fi access points, and provides an identification of the respective Wi-Fi access point and a signal strength of the signal received from the Wi-Fi access point to Wi-Fi receiver 188 .
  • This information is provided to controller circuit 167 which stores the information to memory 165 .
  • controller circuit 167 causes an update and reporting of the location of user attached monitor device 110 via a cellular transceiver 168 and a wide area communication network 150 in accordance with a first time period.
  • reporting the location of user attached monitor device 110 may be done via the public Wi-Fi access point in place of the cellular communication link.
  • reporting the location of user attached monitor device 110 may be done via user detached monitoring device 120 coupled using local communication link 159 .
  • Which technologies are used to update the location of user attached monitor device 110 may be selected either by default, by programming from a central monitor system (not shown), or based upon scenarios. For example, it may be determined whether sufficient battery power as reported by power status 196 remains in user attached monitor device 110 to support a particular position determination technology. Where insufficient power remains, the particular technology is disabled. In some cases, a maximum cost of resolving location may be set for user attached monitor device 110 . For example, resolving Wi-Fi location data may incur a per transaction cost to have a third party service provider resolve the location information. When a maximum number of resolution requests have been issued, the Wi-Fi position determination technology may be disabled. Further, it may be determined the likelihood that a particular position determination technology will be capable of providing meaningful location information.
  • GPS receiver 162 may be disabled to save power.
  • the Wi-Fi receiver 188 may be disabled.
  • support for cell tower triangulation position determination may be disabled.
  • GPS jamming is occurring, GPS receiver 162 may be disabled.
  • the lowest cost (from both a monetary and power standpoint) tracking may be enabled while all other technologies are disabled. Which position determination technologies are used may be based upon which zone a tracking device is located. Some zones may be rich in Wi-Fi access points and in such zones Wi-Fi technology may be used. Otherwise, another technology such as cell tower triangulation or GPS may be used.
  • Controller circuit 167 of user attached monitor device 110 at times functions in conjunction with cellular transceiver 168 to send and receive data and signals through wide area communication network 150 .
  • This link at times is useful for passing information and/or control signals between a central monitoring system (not shown) and user attached monitor device 110 .
  • the information transmitted may include, but is not limited to, location information, alcohol information, and information about the status of user attached monitor device 110 . Based on the disclosure provided herein, one of ordinary skill in the art will recognize a variety of information that may be transferred via wide area communication network 150 .
  • a status monitor 166 may include one or more of the following subcomponents: power status sensor 196 capable of indicating a power status of user detached monitor device 120 .
  • the power status may be expressed, for example as a percentage of battery life remaining. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of forms in which power status may be expressed.
  • user attached monitor device 110 includes a set of shielding sensors 169 that are capable of determining whether user attached monitor device 110 is being shielded from receiving GPS signals and/or if GPS jamming is ongoing, a set of device health indicators 154 , a tamper sensor 131 capable of determining whether unauthorized access to user attached monitor device 110 has occurred or whether user attached monitor device 110 has been removed from an associated individual being monitored, a motion/proximity sensor 152 capable of determining whether user attached monitor device 110 is moving and/or whether it is within proximity of an individual associated with user detached monitor device 120 , and/or an alcohol sensor 153 .
  • Such an alcohol sensor may be any alcohol sensor capable of estimating an amount of alcohol in the individual being monitored.
  • one of ordinary skill in the art will recognize a variety of alcohol sensors and corresponding alcohol sensing circuitry that may be used in relation to different embodiments. Based on the disclosure provided herein, one of ordinary skill in the art will recognize a variety of shielding sensors, a variety of device health transducers and indicators, a variety of tamper sensors, various different types of motion sensors, different proximity to human sensors, and various human body physical measurement sensors or transducers that may be incorporated into user attached monitor device 110 according to various different instances and/or embodiments.
  • FIG. ld a user attached monitor device 1089 is shown with an example attachment element 1090 connected at opposite ends of user attached monitor device 1089 (i.e., a first end 1097 and a second end 1098 ).
  • Attachment element 1090 is operable to securely attach a tracking device 1095 (i.e., a combination of user attached monitor device 1089 and attachment element 1090 ) to a limb of an individual in accordance with some embodiments.
  • attachment element 1090 includes electrically and/or optically conductive material used to make a conductive connection form first end 1097 to second end 1098 through attachment element 1090 and is used in relation to determining whether user attached monitor device 1089 remains attached and/or has been tampered with.
  • FIG. 1 d shows a strap as an example attachment element, based upon the disclosure provided herein, one of ordinary skill in the art will recognize other types of attachment elements that may be used in relation to different embodiments.
  • a flow diagram 200 shows a method for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes in accordance with some embodiments.
  • This method may be used in relation to a user detached monitor device, a user attached monitor device, or a combination of a user attached monitor device and a user detached monitor device.
  • a user detached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1 b .
  • the user detached monitor device may be a mobile phone including one or more applications allowing operation of the method. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user detached monitor devices that may be used in relation to different embodiments.
  • the user attached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1 c . Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user attached monitor devices that may be used in relation to different embodiments.
  • the monitor may be any individual or automated machine capable of setting a schedule for an individual subject to the monitoring. As one example, a monitor may be a parole officer. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of monitors that may operate in relation to different embodiments.
  • a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 205 ).
  • a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network.
  • the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • the check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods.
  • the monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur.
  • the monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur.
  • the monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor.
  • the server system then randomly schedules the desired number of check-in to occur during the set random check-in period.
  • the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.)
  • the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle.
  • the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • check-in window i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system.
  • the monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 210 ).
  • the check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website.
  • the monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows.
  • the monitor may assign unique check-in windows to the check-in periods.
  • the check-in window may not exceed a predetermined duration.
  • any conflicts or overlaps between check-in times and windows are identified (block 215 ). For example, if check-in periods are scheduled for every other hour of the day with check-in windows of one hundred eighty (180) minutes, then successive check-in periods would overlap with the check-in windows of the prior check-in period. This is an undesirable result, as it may encourage users to perform a single check-in or two check-ins close in time during the overlapping period, so as to provide the individual being monitored more time before the next scheduled check-in in which to go out-of-bounds. This undesirable result may also occur even with where check-in periods abut or are very close without actually overlapping. Consequently, in some embodiments, a conflict may be identified where there is an insufficient buffer period between scheduled check-ins such that the temptation for the individual being monitored to go out-of-bounds is not sufficiently mitigated.
  • the schedule indicates a check-in time (block 235 ).
  • the individual being monitored i.e., the expected user of the user detached monitoring device
  • the alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • a check-in failure is indicated (block 250 ). When such a check-in failure is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and an indication of the check-in failure. Alternatively, if the required information is received (block 245 ), a check-in success is indicated (block 255 ). When such a check-in success is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information).
  • all data gathered by the user detached monitoring device is time stamped.
  • time stamp data may be generated from a clock in association with the administered check-in.
  • the timestamp data reflects the time and/or date in which the check-in was administered, and may be transmitted to the remote monitoring system in association with the check-in.
  • the remote monitoring system operates according to a default time (e.g., coordinated universal time or UTC time) while the location monitoring device operates according to the clock time of the user detached monitor device.
  • the clock time of the user detached monitor device may be reset to match the default time.
  • any time stamp data transmitted prior to the reset may be prorated to generate a modified timestamp reflecting the date/time of the administered check-in according to the default time. For example, when a periodic check-in occurs and it is determined that the clock time is, for example, five (5) seconds behind the default time, the timestamp data for the associated check-in transmitted at the check-in is modified by that five (5) second discrepancy to reflect the time of the administered check-in according to the default time. In this manner, the timestamp data for each administered check-in stored by the monitoring station is according to a uniform date/time standard (e.g., according to the default time).
  • the location and user identification information provided by the user detached monitoring device to the remote monitoring system may be utilized by the remote monitoring system to generate one or more reports.
  • reports may include the data from one or more check-ins. In some cases, other data in addition to the check-in data is included in the reports.
  • the reports are generated automatically at specified intervals (e.g., daily, weekly, monthly, or per check-in).
  • the generated reports may be accessed by the monitor via the user interaction system or an interactive web portal to the server supported website, whereby the monitor may review one or more reports online.
  • the generated reports may be emailed or text messaged to the email account or cellular phone of the monitor, respectively.
  • the generated reports may also be provided to the individual being monitored. Such updates to the individual being monitored may be made via email or text, or as a post on a social media account accessed by the individual being monitored.
  • the system provides a text-message opt-in option.
  • a mobile number is added or updated on the website, the system identifies if the number has previously been blacklisted or confirmed. If it has not been either, the system texts an invitation to that number to opt-in to receive text-message alerts and/or reports. If the monitor and/or individual being monitored responds to the invite with a “SUBSCRIBE” response, the number is marked as confirmed and from that point forward is able to receive text messages from the system. At any time, the monitor and/or individual being monitored may text “STOP” to unsubscribe.
  • the web portal may contain functionality allowing the monitor to: add/delete/edit monitor contact information; select for each monitor contact the circumstances (e.g. missed/failed check-ins, daily, weekly, monthly) and methods (e.g. text or email) in which the monitor will receive automated reports and/or alerts.
  • Each of these functionalities, as well as the functionalities of other web portals may be implemented in part or in whole via monitor/user fillable fields, drop down menus and/or selectable icons.
  • the generated reports may include more or less information than what is described herein, but which is nonetheless apparent to one of ordinary skill in the art as desirable for effective monitoring.
  • the generated report may comprise an alert, which is a report with limited information transmitted to the monitor so that the monitor may be apprised of an important event such as a missed/failed check-in.
  • the alert for example, may include a text message that identifies the individual being monitored and the important event.
  • the monitor may access the monitoring station (e.g. the server supported website) and review the generated report having all the requested information.
  • the monitor may customize his/her preferences regarding the alerts not only with regards to the information provided, but as to how the alerts are transmitted and/or displayed.
  • the monitor may be responsible for monitoring a plurality of individuals being monitored.
  • the teachings described herein are applicable to the plurality of individuals being monitored.
  • the generated report may be a combined report, viewable via the server supported website, containing hyperlinks or other access to the reports of each individual being monitored.
  • a flow diagram 300 shows a method for interaction between a user detached monitoring device and a remote monitoring station including ambiguity reduction check-in processes in accordance with various embodiments.
  • a individual being monitored is alerted of a check-in requirement (block 305 ).
  • This alert may be generated locally by a user detached monitoring device based upon a previously downloaded schedule. This alert may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device.
  • the user is notified of the check-in requirements (block 310 ).
  • the alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information for the individual being monitored is to be provided as part of the check-in.
  • the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has one twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • the relevant check-in sensors within the user detached monitoring device are turned on (block 315 ), and the location information for the user detached monitoring device is updated (block 320 ). It is determined whether the required check-in information was received by the user detached monitoring device (block 325 ). If the required information is not received (block 325 ), it is determined if a timeout condition occurred (block 330 ). Where the timeout condition has not been met, it is again determined whether the required check-in information was received by the user detached monitoring device (block 325 ). Where, on the other hand, the timeout condition does occur (block 330 ), the timeout condition and the location information are transmitted from the user detached monitoring device to the remote monitoring system (block 335 ). Alternatively, where the required check-in information was received by the user detached monitoring device (block 325 ), the check-in information and the location information are transmitted from the user detached monitoring device to the remote monitoring system (block 340 ).
  • the remote monitoring system performs various processes based upon the received information.
  • the remote monitoring system indicates a check-in failure and records the location provided from the user detached monitoring device (block 355 ).
  • the check-in information is analyzed by the remote monitoring system to determine whether it is authentic (block 345 ). This may include, for example, comparing a face picture of the individual being monitored received as part of the identification information with a reference photo of the individual being monitored maintained in the remote monitoring system using facial recognition software. As another example, this may include comparing a thumb print received as the identification information with a reference thumb print maintained in remote monitoring system.
  • the remote monitoring system Based upon the aforementioned analysis (block 345 ), it is determined whether the individual providing the identification information via user detached monitoring device is the individual being monitored expected to be associated with the device (i.e., the target of the monitoring) (block 350 ). Where the individual being monitored is authenticated as the expected individual being monitored (block 350 ), the remote monitoring system indicates a check-in success and records the location information and identification received as part of the check-in (block 360 ). Alternatively, where the individual being monitored is not authenticated as the expected individual being monitored (block 350 ), the remote monitoring system indicates a check-in failure and records the location provided from the user detached monitoring device (block 355 ).
  • Some embodiments implement the user detached monitoring device as part of a smart phone or other personal smart device, such as a PDA or the like.
  • a schedule is created according to which the check-ins are to be administered.
  • the schedule may be generated and/or stored by the server system based on input provided by the monitor.
  • Reference data is provided to the remote monitoring system by one or more of the monitor, the individual being monitored, and the user detached monitoring device.
  • the reference data may include reference identification information data against which to compare check-in associated identification information data.
  • the reference identification information data may include an image of the individual being monitored against which facial recognition software may be used to compare check-in image data of the individual being monitored.
  • the reference identification information data may include a reference thumb print or other reference biometric data against which to compare the check-in associated identification information data.
  • the reference data may further include reference location data against which to compare check-in associated location data to determine whether the individual being monitored is out-of-bounds.
  • the reference location data may be, for example, a defined distance vector (e.g., a predetermined radius) from a geographic location—and out-of-bounds may be defined as either within or without the distance vector.
  • the reference data is retrievably stored by the monitoring station, which utilizes it as described herein to compare against check-in associated data, thereby determining the appropriate check-in result (e.g., missed, failed, passed).
  • the schedule may be accessed by the monitoring device so as to prompt the individual being monitored to initiate scheduled check-ins.
  • the schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. For example, a bump reminder may appear on the smart phone of the individual being monitored prompting the scheduled check-in.
  • the individual being monitored of the user detached monitoring device administers the check-in. This occurs by the individual being monitored engaging the identification information sensor(s) so as to generate the identification information data. For example, for a retinal scan or facial recognition sensing, the individual being monitored may orient the smart phone camera to capture his/her eye or face. For example, for a thumbprint or other biometric scan, the individual being monitored may place his thumbprint onto the touch-screen of the smart phone to be read thereby.
  • the location data is more or less contemporaneously generated with the identification information data so as to guard against forgery.
  • the identification information data generation may require that the individual being monitored hold the engagement of the identification information sensor (e.g., hold his/her thumb in place, or hold the camera focused on his/her face) for a predetermined period while the location data is being generated.
  • the location data and the identification information data are transmitted from the user detached monitoring device to the remote monitoring system in accordance with the schedule, as described above.
  • the scheduled check-in may be associated with a ‘missed’ result.
  • the scheduled check-in may be associated with a ‘failed’ result.
  • the location and/or identification information data and/or results may be utilized by the system to generate one or more reports based thereon.
  • Such reports may include the data (and other data) from one or more administered and/or scheduled check-ins.
  • the generated reports may be accessed by the monitor via the interactive web portal to the server supported website, whereby the monitor may review one or more reports online.
  • the generated reports may be e-mailed or text messaged to the e-mail account or cellular phone of the monitor, respectively.
  • a flow diagram 400 shows a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station.
  • the method includes scheduling and check-in processes using data accessed from a user detached monitor device and use of a user attached monitor device to provide automatic updates.
  • a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 405 ).
  • a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network.
  • the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • the check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods.
  • the monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur.
  • the monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur.
  • the monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor.
  • the server system then randomly schedules the desired number of check-in to occur during the set random check-in period.
  • the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.)
  • the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle.
  • the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • check-in window i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system.
  • the monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 410 ).
  • the check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website.
  • the monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows.
  • the monitor may assign unique check-in windows to the check-in periods.
  • the check-in window may not exceed a predetermined duration.
  • a schedule is accessed from a user detached monitor device by a remote monitor station (block 415 ).
  • the accessed schedule is under control of the individual being monitored and possibly represents a schedule that the individual envisions following.
  • One of the struggles with introducing an offender back into society is getting that individual to take control of their lives and to perform activities on a schedule dictated by them.
  • the individual is trained to begin directing their life, and to design and keep to a schedule.
  • any monitoring performed can be used to reinforce the schedule.
  • the schedule is compared with the check-in schedule to determine whether there are any conflicts that the monitor desires to respect (block 420 ). For example, a monitor may respect an individual's time at work, but may not respect an individual's planned workout time. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of scheduled events that may be respected and others that are not respected.
  • the schedule indicates a check-in time (block 440 ).
  • the scheduled check-in was uploaded to the user detached monitor device it is identified as a manual check-in (block 445 ) and the individual being monitored (i.e., the expected user of the user detached monitoring device) is alerted of the check-in requirements (block 450 ). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device.
  • the alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in.
  • the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • the scheduled check-in was uploaded to the user attached monitor device it is identified as an automatic check-in (i.e., not a manual check-in) (block 445 ) and the user attached monitor device automatically gathers status and performs the check-in process without involving the individual being monitored (block 460 ).
  • the status may include, but is not limited to, a time stamp, a location of the user attached monitor device, and/or whether the user attached monitor device is within communication range of the user detached monitor device. Determining whether the user attached monitor device is within communication range of the user detached monitor device may be done, for example, by sending a communication between the user detached monitor device and the user attached monitor device that allows one or both of the devices to know that the other is within communication proximity.
  • this may be done by the user attached monitor device sending a BluetoothTM request to the user attached monitor device and awaiting a response. Upon receiving the request, the user detached monitor device knows it is within proximity of the user attached monitor device. Upon receiving the response, the user attached monitor device knows it is within proximity of the user detached monitor device. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of processes and/or communication protocols that may be used in relation to different embodiments to discern device proximity. Further, based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of status that can be gathered by the user attached monitor device without involving the individual being monitored.
  • a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information).
  • Time stamping and report generation may be done similar to that discussed above in relation to FIG. 2 .
  • a flow diagram 500 shows a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device.
  • a conflict is purposely created with a schedule accessed from the user detached monitor device.
  • a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 505 ).
  • a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network.
  • the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • the check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods.
  • the monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur.
  • the monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur.
  • the monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor.
  • the server system then randomly schedules the desired number of check-in to occur during the set random check-in period.
  • the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.)
  • the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle.
  • the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • check-in window i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system.
  • the monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 510 ).
  • the check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website.
  • the monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows.
  • the monitor may assign unique check-in windows to the check-in periods.
  • the check-in window may not exceed a predetermined duration.
  • a schedule is accessed from a user detached monitor device by a remote monitor station (block 515 ).
  • the accessed schedule is under control of the individual being monitored and possibly represents a schedule that the individual envisions following.
  • One of the struggles with introducing an offender back into society is getting that individual to take control of their lives and to perform activities on a schedule dictated by them.
  • the individual is trained to begin directing their life, and to design and keep to a schedule.
  • any monitoring performed can be used to reinforce the schedule.
  • the schedule is compared with the check-in schedule to determine whether there are any conflicts that the monitor desires to respect (block 520 ).
  • a monitor may respect an individual's time at work, but may not respect an individual's planned workout time or an individual's social calendar. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of scheduled events that may be respected and others that are not respected.
  • the monitor may then adjust the check-in schedule and/or check-in windows create a conflict with non-respected scheduled events (block 525 ).
  • This modified check-in schedule including check-in windows is uploaded from the remote monitor station to the user detached monitoring device (block 535 ).
  • the schedule indicates a check-in time (block 540 ).
  • the individual being monitored i.e., the expected user of the user detached monitoring device
  • the alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device.
  • the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information).
  • a flow diagram 600 shows a method for interaction between a user detached monitoring device and both a remote monitoring station and a user attached monitor device including scheduling and check-in processes in accordance with some embodiments.
  • a user detached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1 b .
  • the user detached monitor device may be a mobile phone including one or more applications allowing operation of the method. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user detached monitor devices that may be used in relation to different embodiments.
  • the user attached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1 c .
  • the monitor may be any individual or automated machine capable of setting a schedule for an individual subject to the monitoring.
  • a monitor may be a parole officer.
  • monitors that may operate in relation to different embodiments.
  • a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 605 ).
  • a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network.
  • the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • the check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods.
  • the monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur.
  • the monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur.
  • the monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor.
  • the server system then randomly schedules the desired number of check-in to occur during the set random check-in period.
  • the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.)
  • the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle.
  • the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • check-in window i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system.
  • the monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 610 ).
  • the check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website.
  • the monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows.
  • the monitor may assign unique check-in windows to the check-in periods.
  • the check-in window may not exceed a predetermined duration.
  • any conflicts or overlaps between check-in times and windows are identified (block 615 ). For example, if check-in periods are scheduled for every other hour of the day with check-in windows of one hundred eighty (180) minutes, then successive check-in periods would overlap with the check-in windows of the prior check-in period. This is an undesirable result, as it may encourage users to perform a single check-in or two check-ins close in time during the overlapping period, so as to provide the individual being monitored more time before the next scheduled check-in in which to go out-of-bounds. This undesirable result may also occur even with where check-in periods abut or are very close without actually overlapping. Consequently, in some embodiments, a conflict may be identified where there is an insufficient buffer period between scheduled check-ins such that the temptation for the individual being monitored to go out-of-bounds is not sufficiently mitigated.
  • the schedule indicates a check-in time (block 635 ).
  • the individual being monitored i.e., the expected user of the user detached monitoring device
  • an ongoing automated check-in (block 640 ). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device.
  • the result of the determination of whether the user detached monitor device is within communication range of the user attached monitor device is uploaded to the remote monitor station along with any other relevant information including, but not limited to, time and location of one or both of the user detached monitor device and/or the user attached monitor device (block 650 ). Where the user detached monitor device is within communication range of the user attached monitor device (block 655 ), a successful check-in is indicated (block 665 ). Otherwise, a check-in failure is indicated (block 660 ). Time stamping and report generation may be done similar to that discussed above in relation to FIG. 2 .
  • the present invention provides for novel systems, devices, and methods for monitoring individuals and/or assets. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Abstract

Various embodiments provide systems and method for monitoring individuals.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • The present application is a divisional application due safe harbor under 35 USC § 121 of U.S. patent application Ser. No. 16/221,493 entitled “Systems and Methods for Semi-Autonomous Individual Monitoring” and filed Dec. 15, 2018 by Buck et al.; which in turn claims priority to (i.e., is a non-provisional of) US Pat. App. No. 62/612,650 entitled “Systems and Methods for Monitoring Individuals”, and filed Jan. 1, 2018 by Buck et al. The entirety of the aforementioned applications is incorporated herein by reference for all purposes.
  • BACKGROUND OF THE INVENTION
  • Various embodiments provide systems and method for semi-autonomous monitoring of individuals.
  • Large numbers of individuals are currently monitored as part of parole requirements or other requirements. Such monitoring allows a monitoring agency to determine whether the individual is engaging in acceptable patterns of behavior, and where an unacceptable behavior is identified to stop such behavior going forward. In many monitoring systems, the lack of sufficient mobile power limits the ability of a monitoring agency to know the movement details of a tracked individual.
  • Thus, for at least the aforementioned reasons, there exists a need in the art for more advanced approaches, devices and systems for monitoring.
  • BRIEF SUMMARY OF THE INVENTION
  • Various embodiments provide systems and method for semi-autonomous monitoring of individuals.
  • This summary provides only a general outline of some embodiments. Many other objects, features, advantages and other embodiments will become more fully apparent from the following detailed description, the appended claims and the accompanying drawings and figures.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A further understanding of the various embodiments may be realized by reference to the figures which are described in remaining portions of the specification. In the figures, similar reference numerals are used throughout several drawings to refer to similar components. In some instances, a sub-label consisting of a lower case letter is associated with a reference numeral to denote one of multiple similar components. When reference is made to a reference numeral without specification to an existing sub-label, it is intended to refer to all such multiple similar components.
  • FIG. 1a is a block diagram illustrating a hybrid monitoring system including both a user attached monitor device and a user detached monitor device in accordance with various embodiments;
  • FIG. 1b is a block diagram of a user detached monitor device usable in accordance with one or more embodiments;
  • FIG. 1c is a block diagram of a user attached monitor device including a local communication link in accordance with some embodiments;
  • FIG. 1d shows a user attached monitor device with an attachment element for attaching the user attached monitor device to a limb of an individual in accordance with some embodiments;
  • FIG. 2 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes;
  • FIG. 3 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including ambiguity reduction check-in processes;
  • FIG. 4 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device and including use of a user attached monitor device to provide automatic updates;
  • FIG. 5 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device where a conflict is purposely created with a schedule accessed from the user detached monitor device; and
  • FIG. 6 is a flow diagram showing a method in accordance with some embodiments for interaction between a user detached monitoring device and both a remote monitoring station and a user attached monitoring device including scheduling and check-in processes.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Various embodiments provide systems and method for monitoring individuals.
  • It has been found that returning offenders to society after being locked up in a secure facility with little if any control of their day to day activities is often unsuccessful. It is often helpful to have, for example, a parole officer monitor their movements and activities for a period of time as they reenter society. In some cases, the parole officer is aided by a tracking device attached to the individual being monitored. However, this is costly as a parole officer must be significantly involved in monitoring and responding to situations. Some embodiments disclosed herein reduce the interaction between the tracking device and the parole officer.
  • Further, it has been found that once a monitoring term has been completed and a monitored individual has been fully released into society without oversight, the chances that the individual will re-engage in problematic behavior is high. Various embodiments disclosed herein provides tools and devices that continue to support the individual as they transition away from the active oversight by, for example, a parole officer.
  • Some embodiments provide monitoring systems that have a monitoring station. The monitoring station includes: a communication apparatus configured to communicate with both a user detached monitor via a first communication link and a user attached monitor via a second communication link and a computer readable medium. Both the user detached monitor and the user attached monitor are associated with an individual being monitored is associated. The computer readable medium includes instructions executable by a processor to: identify a conflict with an original check-in schedule; generate a modified check-in schedule by modifying the original check-in schedule in an aspect related to the conflict; upload the modified check-in schedule to a combination of the user detached monitor and the user attached monitor; receive check-in information from at least one of the user detached monitor or the user attached monitor; and determine if the check-in information complies with the check-in schedule.
  • In some instances of the aforementioned embodiments, the computer readable medium further includes instructions executable by the processor to receive one or more check-in windows associated with two or more check-in times in the original check-in schedule. Identifying the conflict with the original check-in schedule includes: determining that an end of a check-in window for a first check-in time is within a defined time period of a beginning of a check-in window for a second check-in time, and indicating the conflict. Modifying the original check-in schedule in an aspect related to the conflict includes one or more of: removing one of the first check-in time or the second check-in time from the original check-in schedule, reducing the check-in window of the first check-in time in the original check-in schedule, or reducing the check-in window of the second check-in time in the original check-in schedule.
  • In various instances of the aforementioned embodiments, the system includes the user detached monitor, and the instructions that identify the conflict with the original check-in schedule includes instructions executable by the processor to: access an individual schedule from the user detached monitor; compare the individual schedule with the original check-in schedule, wherein the conflict is found where it is determined that an event in the individual schedule overlaps an event in the original check-in schedule; and modifying the original check-in schedule in the aspect related to the conflict includes removing the check-in time corresponding to the conflict to yield the modified check-in schedule as the check-in schedule without the check-in time corresponding to the conflict. In some cases, the communication apparatus is a first communication apparatus, the processor is a first processor, the computer readable medium is a first computer readable medium, and the user detached monitor includes: a second a communication apparatus operable to receive the modified check-in schedule from the monitoring station; and a second computer readable medium. The second computer readable medium includes instructions executable by a second processor to: alert the individual being monitored of a check-in requirement at a time designated by the modified check-in schedule; receive input from the individual being monitored via one or more sensors of the user detached monitor; and upload at least a portion of the input received from the individual being monitored to the monitoring station. In certain cases, the second computer readable medium further includes instructions executable by the second processor to enable the one or more sensors of the user detached monitor.
  • In one or more instances of the aforementioned embodiments, the communication apparatus is a first communication apparatus, the processor is a first processor, the computer readable medium is a first computer readable medium, and the user detached monitor includes: a second communication apparatus operable to receive at least a portion of the check-in schedule where the portion of the check-in schedule includes the check-in time corresponding to the conflict, and a second computer readable medium. The second computer readable medium includes instructions executable by a second processor to: receive a request for the individual schedule from the monitoring station; provide the individual schedule to the monitoring station in response to the request; alert the individual being monitored of a check-in requirement at a time designated by the portion of the modified check-in schedule; receive input from the individual being monitored via one or more sensors of the user detached monitor; and upload at least a portion of the input received from the individual being monitored to the monitoring station.
  • In various instances of the aforementioned embodiments, the monitoring system further includes the user attached monitor, and the user attached monitor includes: an attachment element configured to attach to a limb of an individual being monitored, a tamper sensor configured to indicate removal of the user attached monitor from the individual being monitored, and a communication circuit. The communication circuit is operable to: receive a portion of the modified check-in schedule including the check-in time corresponding to the conflict; and provide status to the monitoring station without interaction with the individual being monitored in accordance with the portion of the modified check-in schedule.
  • In one or more instances of the aforementioned embodiments, the first communication link and the second communication link are cellular telephone networks. In various instances of the aforementioned embodiments, uploading the modified check-in schedule to the combination of the user detached monitor and the user detached monitor includes an upload process selected from a group consisting of: uploading the modified check-in schedule only to the user detached monitor; uploading the modified check-in schedule only to the user attached monitor; and uploading a first portion of the modified check-in schedule to the user attached monitor and uploading a second portion of the modified check-in schedule to the user detached monitor.
  • Other embodiments provide monitoring systems that include a user detached monitor. The user detached monitor includes: a sensor configured to receive input from the individual being monitored; a communication apparatus operable to receive at least a portion of an implemented check-in schedule from a monitoring station via a wireless communication network, a processor, and a computer readable medium including instructions executable by the processor. The implemented check-in schedule includes: at least one check-in window and a corresponding check-in time, and a check-in instruction indicating the check-in time and an action to be performed in relation to the sensor. The computer readable medium includes instructions executable by the processor to: alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule; enable the sensor; receive input from the sensor; and upload the input received from the sensor to the monitoring station. In some cases, the wireless communication network is a cellular telephone network.
  • In various instances of the aforementioned embodiments, the communication apparatus is a first communication apparatus, the computer readable medium is a first computer readable medium, the processor is a first processor, and the monitoring system further includes the monitoring station. The monitoring station includes: a second communication apparatus configured to communicate with the user detached monitor via a communication link, and a second computer readable medium. The second computer readable medium including instructions executable by a second processor to: receive an original check-in schedule for the individual being monitored; identify a conflict with the original check-in schedule; modify the original check-in schedule to change an aspect of the original check-in schedule in an aspect related to the conflict to yield the implemented check-in schedule; upload at least the portion of the implemented check-in schedule to the user detached monitor; receive check-in information from the user detached monitor; and determine if the check-in information complies with the portion of the implemented check-in schedule. In some cases, the second computer readable medium further includes instructions executable by the second processor to receive one or more check-in windows associated with two or more check-in times in the original check-in schedule. In such cases, identifying the conflict with the check-in schedule includes: determining that an end of a check-in window for a first check-in time is within a defined time period of a beginning of a check-in window for a second check-in time; and indicating the conflict. Modifying the original check-in schedule to change an aspect of the original check-in schedule in an aspect related to the conflict includes one or more of: removing one of the first check-in time or the second check-in time from the check-in schedule, reducing the check-in window of the first check-in time in the check-in schedule, or reducing the check-in window of the second check-in time in the check-in schedule.
  • In some instances of the aforementioned embodiments, the instructions that identify the conflict with the original check-in schedule includes instructions executable by the second processor to: access an individual schedule from the user detached monitor; and compare the individual schedule with the original check-in schedule, where the conflict is found where it is determined that an event in the individual schedule overlaps an event in the original check-in schedule. Modifying the original check-in schedule to change an aspect of the original check-in schedule related to the conflict includes removing the check-in time corresponding to the conflict to yield the implemented check-in schedule.
  • In various instances of the aforementioned embodiments, the first computer readable medium further includes instructions executable by the first processor to: receive a request for the individual schedule from the monitoring station; and provide the individual schedule to the monitoring station in response to the request. In one or more instances of the aforementioned embodiments, the monitoring system further includes a user attached monitor. The user attached monitor includes: an attachment element configured to attach to a limb of an individual being monitored; a tamper sensor configured to indicate removal of the user attached monitor from the individual being monitored; and a communication circuit. The communication circuit is operable to: receive a portion of the implemented check-in schedule including the check-in time corresponding to the conflict; and provide status to the monitoring station without interaction with the individual being monitored in accordance with the portion of the implemented check-in schedule. In certain instances of the aforementioned embodiments, the sensor is selected from a group consisting of: a camera, an audio sensor; a temperature sensor, and a biometric sensor. In various instances of the aforementioned embodiments, the sensor is a biometric sensor. Such a biometric sensor may be, but is not limited to, a finger print sensor, and/or a retinal scan sensor.
  • Yet other embodiments provide monitoring systems that include a monitoring station and a user detached monitor. The monitoring station includes: a first communication apparatus configured to communicate with a user detached monitor associated with an individual being monitored via a cellular telephone network; and a first computer readable medium. The first computer readable medium includes instructions executable by a first processor to: receive an original check-in schedule for the individual being monitored, where the original check-in schedule includes at least a first check-in time and a first check-in window corresponding to the first check-in time, and a second check-in time and a second check-in window corresponding to a second check-in time; identify an internal conflict within the original check-in schedule, where the conflict occurs where an end of the first check-in window is within a defined time period of a beginning of the second check-in window; and modify the original check-in schedule. Modifying the original check-in schedule includes performing at least one of the following functions to yield an implemented check-in schedule: removing one of the first check-in time or the second check-in time from the check-in schedule; reducing the check-in window of the first check-in time in the check-in schedule; or reducing the check-in window of the second check-in time in the check-in schedule. The first computer readable medium includes instructions executable by a first processor to upload at least the portion of the implemented check-in schedule to the user detached monitor. The user detached monitor includes: a sensor configured to receive input from the individual being monitored; a second communication apparatus operable to receive at least a portion of an implemented check-in schedule from the monitoring station via the cellular telephone network; and a second computer readable medium. The second computer readable medium includes instructions executable by the second processor to: alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule; receive input from the sensor; and upload the input received from the sensor to the monitoring station as check-in information.
  • Turning to FIG. 1a , a block diagram illustrates a hybrid monitoring system 100 including both a user attached monitor device 110 and a user detached monitor device 120 in accordance with various embodiments. A local communication link 112 allows for communication between user attached monitor device 110 and user detached monitor device 120. Local communication link 112 may be any communication link that is capable of transferring information or otherwise communicating between two devices within a relatively short distance of each other. In some cases, for example, local communication link 112 may be a BlueTooth™ communication link. In other examples, local communication link 112 may be a line of sight infared communication link. As yet other examples, local communication link 112 may be a WiFi communication link. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and/or media that may be used to implement local communication link 112.
  • User detached monitor device 120 is portable, and may be any device that is recognized as being used by or assigned to an individual being monitored, but is not physically attached to the individual being monitored by a tamper evident attaching device. User detached monitor device 120 may be, but is not limited to, a cellular telephone capable of communication with user attached monitor device 110 via local communication link 112. In contrast, user attached monitor device 110 is attached to the individual being monitored using a tamper evident attaching device like a strap. User attached monitor device 110 may be, but is not limited to, a tracking device that is attached around the limb of an individual and includes indicators to monitor whether the device has been removed from the individual or otherwise tampered. Hybrid monitoring system 100 further includes a central monitoring station 160 wirelessly coupled to user attached monitor device 110 and user detached monitor device 120 via one or more wide area wireless (e.g., cellular telephone network, Internet via a Wi-Fi access point, or the like) communication networks 150.
  • User detached monitor device 120 includes a location sensor that senses the location of the device and generates a location data. The location data may comprise one or more of: global positioning system (“GPS”) data, Assisted GPS (“A-GPS”) data, Advanced Forward Link Trilateration (“AFLT”) data, and/or cell tower triangulation data. Where GPS is used, user detached monitor device 120 receives location information from three or more GPS satellites 145 a, 145 b, 145 c via respective communication links 130, 131, 132. The aforementioned location data is utilized verify the location of a user associated with user detached monitor device 120 at various points as more fully discussed below. User detached monitor device 120 is considered “ambiguous” because it is not attached to the user in a tamper resistant/evident way, but rather is freely severable from the user and thus could be used by persons other than the target. Various processes discussed herein mitigate the aforementioned ambiguity to yield a reasonable belief that information derived from user detached monitor device 120 corresponds to the target.
  • The location data and/or other data gathered by user detached monitor device 120 is wirelessly transmitted to central monitoring station 160 via wide area wireless network 150 accessed via a wireless link 133. Central monitoring station 160 may be any location, device or system where the location data is received, including by way of non-limiting example: a cellular/smart phone, an email account, a website, a network database, and a memory device. The location data is stored by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual. In this manner, monitor is able to respond appropriately to the detected out-of-bounds activity by a user. In some cases, the monitor is able to retrieve the location data via a user interaction system 185 which may be, but is not limited to, a network connected user interface device communicatively coupled via a network to central monitoring station 160 and/or directly to user detached monitor device 120 via wide area wireless network 150.
  • User detached monitor device 120 may further include a user identification sensor operable to generate user identification data for identifying the user in association with the generation of the location data. The user identification data may comprise one or more of: image data, video data, biometric data (e.g. fingerprint, DNA, retinal scan, etc. data), or any other type of data that may be used to verify the identity of the user at or near the time the location data is generated. And the user identification sensor may comprise one or more of: a camera, microphone, heat sensor, biometric data sensor, or any other type of device capable of sensing/generating the aforementioned types of user identification data.
  • The user identification data is wirelessly transmitted in association with the location data to central monitoring station 160 via a wireless transmitter communicatively coupled to the user identification sensor. The user identification data is stored in association with the location data by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual. Preferably, the monitor is able to retrieve the location data via a network connected user interface device communicatively coupled—via the network—to central monitoring station 160 and/or to user detached monitor device 120. The location data may be transmitted to central monitoring station 160 independent of the user identification data, for example, during a periodic check-in with central monitoring system 160.
  • User detached monitor device 120 may further comprise a memory communicatively coupled to a control unit—which is also communicatively coupled to the location sensor, the identification sensor and the wireless transceiver—for controlling the operations thereof in accordance with the functionalities described herein. The memory may include non-transient instructions (e.g., software of firmware based instructions) executable by the control unit to perform and/or enable various functions associated with user detached monitor device 120. As user detached monitor device 120 is portable, each of the components may be located within, immediately adjacent to, or exposed without, a device housing whose dimensions are such that user detached monitor device 120 as a whole may be discretely carried by the user, for example, within a pocket or small purse. User detached monitor device 120 may include a Wi-Fi transceiver capable of receiving information from one or more Wi-Fi access points 187 that can be used to discern location via a Wi-Fi communication link 114.
  • Central monitoring station 160 preferably comprises a server supported website, which may be supported by a server system comprising one or more physical servers, each having a processor, a memory, an operating system, input/output interfaces, and network interfaces, all known in the art, coupled to the network. The server supported website comprises one or more interactive web portals through which the monitor may monitor the location of the user in accordance with the described embodiments. In particular, the interactive web portals may enable the monitor to retrieve the location and user identification data of one or more users, set or modify ‘check-in’ schedules, and/or set or modify preferences. The interactive web portals are accessible via a personal computing device, such as for example, a home computer, laptop, tablet, and/or smart phone.
  • In some embodiments, the server supported website comprises a mobile website accessible via a software application on a mobile device (e.g. smart phone). The mobile website may be a modified version of the server supported website with limited or additional capabilities suited for mobile location monitoring.
  • User attached monitor device 110 includes a location sensor that senses the location of the device and generates a location data. The location data may comprise one or more of: global positioning system (“GPS”) data, Assisted GPS (“A-GPS”) data, Advanced Forward Link Trilateration (“AFLT”) data, and/or cell tower triangulation data. Where GPS is used, user attached monitor device 110 receives location information from three or more GPS satellites 145 a, 145 b, 145 c via respective communication links 136, 138, 139. The aforementioned location data is utilized to verify the location of a user associated with user attached monitor device 110 at various points as more fully discussed below. User attached monitor device 110 is considered “non-ambiguous” because it is physically attached to the user in a tamper resistant way and as such provides information only about the user to which it is attached.
  • The location data and/or other data gathered by user attached monitor device 110 is wirelessly transmitted to central monitoring station 160 via a wide area wireless network 150 accessed via a wireless link 135. Central monitoring station 160 may be any location, device or system where the location data is received, including by way of non-limiting example: a cellular/smart phone, an email account, a website, a network database, and a memory device. The location data is stored by central monitoring station 160 and is retrievable therefrom by a monitor, such as a parent, guardian, parole officer, court liaison, spouse, friend, or other authorized group or individual. In this manner, monitor is able to respond appropriately to the detected out-of-bounds activity by a user.
  • User attached monitor device 110 may further comprise a memory communicatively coupled to a control unit—which is also communicatively coupled to the location sensor, the identification sensor and the wireless transceiver—for controlling the operations thereof in accordance with the functionalities described herein. The memory may include non-transient instructions (e.g., software of firmware based instructions) executable by the control unit to perform and/or enable various functions associated with user attached monitor device 110. User attached monitor device may include a strap which can be wrapped around a limb of the individual being monitored to secure user attached monitor device to the individual. The strap includes one or more tamper circuits and/or sensors that allow for a determination as to whether the device has been removed or otherwise tampered. Examples of a strap and tamper detection circuitry that may be used in relation to various embodiments discussed herein are described in U.S. Pat. No. 9,355,579 entitled “ Methods for Image Based Tamper Detection”, and filed by Buck et al. on Sep. 15, 2014; and US Pat. Pub. No. US 2017-0270778 A1 entitled “Systems and Methods for Improved Monitor Attachment”, and filed by Melton et al. on Mar. 21, 2016. Both of the aforementioned references are incorporated herein by reference for all purposes. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of straps, tamper circuits, tamper devices, and/or attachment and tamper detection approaches that may be used in relation to various embodiments. User attached monitor device 110 may include a Wi-Fi transceiver capable of receiving information from one or more Wi-Fi access points 187 that may be used to identify location via a Wi-Fi communication link 113.
  • Turning to FIG. lb, a block diagram of user detached monitor device 120 is shown in accordance with one or more embodiments. User detached monitor device 120 includes wireless transceiver circuitry 128 that is capable of sending and receiving information via wireless link 133 to/from wide area wireless network 150. Wireless transceiver circuitry 128 may be any circuitry, integrated circuit, and/or processor or controller capable of supporting wireless communication. Such wireless communication may include, but is not limited to, cellular telephone communication, Internet communication via a Wi-Fi access point, or both. In addition, user detached monitor device 120 includes a vibrator 112, a speaker 114, and a visual display and touch screen 116. In some cases, at scheduled times a user of user detached monitor device 120 is alerted of a need to check-in. The schedule of check-in times may be downloaded to a memory 124 by central monitoring station 160 via wireless link 133. The user may be alerted by one or more of: a visual prompt via visual display and touch screen 116, an audio prompt via speaker 114, and a tactile prompt via vibrator 112. Each of vibrator 112, speaker 114, and visual display and touch screen 116 is communicatively coupled to memory 124 and/or a control circuit 122 for controlling the operations thereof. In some cases, control circuit 122 includes a processor. In various cases, control circuit 122 is part of an integrated circuit. In one or more cases, memory 124 is included in an integrated circuit with control circuit 122. In various cases, memory 124 may include non-transient instructions (e.g., software of firmware based instructions) executable by controller circuit 122 to perform and/or enable various functions associated with user detached monitor device 120. A visual prompt may include, but is not limited to, text, images and/or a combination thereof, or a series of such visual prompts. An audio prompt may include, but is not limited to, one or more different audio prompts, or a series thereof. Each prompt may be stored in memory 124 and retrieved in accordance with the schedule that is also maintained in memory 124. In some embodiments, alerting the user involves a prompt that includes an e-mail or text message generated by central monitoring station 160 (e.g. the server supported website) and transmitted to the e-mail account or cellular phone number corresponding to user detached monitor device 120. In particular embodiments, such a prompt may include a ‘post’ on the user's ‘wall,’ ‘feed,’ or other social networking privilege. In some embodiments, the prompt may comprise an automated or live phone call to the user.
  • User detached monitor device 120 further includes user identification circuitry 179 capable of gathering user identification information from one or more of a microphone 171, a camera 173, a temperature sensor 175, and/or a biometric sensor 177. In some cases, user identification circuitry 179 is incorporated in an integrated circuit with control circuit 122. Microphone 171 is capable of accurately capturing the sound of a user's voice, camera 173 is capable of accurately capturing images including, for example, an image of the user's face, temperature sensor 175 is capable of accurately capturing an ambient temperature around user detached monitor device 120, and biometric sensor 177 is capable of accurately capturing biometric data about the user including, but not limited to, a thumb print, a retinal scan, or a breath-based alcohol measurement. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of biometric data and corresponding sensors that may be used in relation to different embodiments. Under the direction of control circuitry 122, user identification circuitry 179 assembles one or more elements of data gathered by microphone 171, a camera 173, a temperature sensor 175, and/or a biometric sensor 177 into a user identification package which is forwarded to central monitoring station 160 via wireless transceiver circuitry 128.
  • User detached monitor device 120 additionally includes location circuitry 126. Location circuitry 126 may include one or more of, a GPS processing circuit capable of fixing a location of user detached monitor device 120 using GPS data, and/or a cell tower triangulation processing circuit capable of fixing a location of user detached monitor device 120 using cell tower triangulation data. A local communication link 181 controls communication between user detached monitor device 120 and user attached monitor device 110. In some embodiments, local communication link 181 supports a BlueToothTM communication protocol and is capable of both receiving information from user attached monitor device 110 and transmitting information to user attached monitor device 110. In other embodiments, Local communication link 181 supports a Wi-Fi communication protocol and is capable of both receiving information from user attached monitor device 110 and transmitting information to user attached monitor device 110. In some cases, local communication link 181 supports communication in only a receive or transmit direction. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and information transfer directions that may be supported by local communication link 181 in accordance with different embodiments.
  • Turning to FIG. 1c , a block diagram 194 of user attached monitor device 110 including a local communication link 159 in accordance with some embodiments. Local communication link 159 controls communication between user attached monitor device 110 and user detached monitor device 120. In some embodiments, local communication link 159 supports a BlueTooth™ communication protocol and is capable of both receiving information from user detached monitor device 120 and transmitting information to user detached monitor device 120. In other embodiments, local communication link 159 supports a Wi-Fi communication protocol and is capable of both receiving information from user detached monitor device 110 and transmitting information to user detached monitor device 110. In some cases, local communication link 159 supports communication in only a receive or transmit direction. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of communication protocols and information transfer directions that may be supported by local communication link 159 in accordance with different embodiments.
  • As shown, user attached monitor device 110 includes a device ID 161 that may be maintained in a memory 165, and thus is accessible by a controller circuit 167. Controller circuit 167 is able to interact with a GPS receiver 162 and memory 165 at times for storing and generating records of successively determined GPS locations. Similarly, controller circuit 167 is able to interact with a Wi-Fi receiver 188 and memory 165 at times for storing and generating records of successively determined Wi-Fi access point identifications and signal strength. In some cases, memory 165 may include non-transient instructions (e.g., software of firmware based instructions) executable by controller circuit 167 to perform and/or enable various functions associated with user attached monitor device 110. As user attached monitor device 110 comes within range of one or more Wi-Fi access points (e.g., Wi-Fi access points 187), Wi-Fi receiver 188 senses the signal provided by the respective Wi-Fi access points, and provides an identification of the respective Wi-Fi access point and a signal strength of the signal received from the Wi-Fi access point to Wi-Fi receiver 188. This information is provided to controller circuit 167 which stores the information to memory 165.
  • Where user attached monitor device 110 is operating in a standard mode, controller circuit 167 causes an update and reporting of the location of user attached monitor device 110 via a cellular transceiver 168 and a wide area communication network 150 in accordance with a first time period. In contrast, where user attached monitor device 110 is within range of a public Wi-Fi access point, reporting the location of user attached monitor device 110 may be done via the public Wi-Fi access point in place of the cellular communication link. In another case where user attached monitor device 110 is operating in a low battery mode, reporting the location of user attached monitor device 110 may be done via user detached monitoring device 120 coupled using local communication link 159.
  • Which technologies are used to update the location of user attached monitor device 110 may be selected either by default, by programming from a central monitor system (not shown), or based upon scenarios. For example, it may be determined whether sufficient battery power as reported by power status 196 remains in user attached monitor device 110 to support a particular position determination technology. Where insufficient power remains, the particular technology is disabled. In some cases, a maximum cost of resolving location may be set for user attached monitor device 110. For example, resolving Wi-Fi location data may incur a per transaction cost to have a third party service provider resolve the location information. When a maximum number of resolution requests have been issued, the Wi-Fi position determination technology may be disabled. Further, it may be determined the likelihood that a particular position determination technology will be capable of providing meaningful location information. For example, where user attached monitor device 110 is moved indoors, GPS receiver 162 may be disabled to save power. Alternatively, where the tracking device is traveling at relatively high speeds, the Wi-Fi receiver 188 may be disabled. As yet another example, where cellular phone jamming is occurring, support for cell tower triangulation position determination may be disabled. As yet another example, where GPS jamming is occurring, GPS receiver 162 may be disabled. As yet another example, where user attached monitor device 110 is stationary, the lowest cost (from both a monetary and power standpoint) tracking may be enabled while all other technologies are disabled. Which position determination technologies are used may be based upon which zone a tracking device is located. Some zones may be rich in Wi-Fi access points and in such zones Wi-Fi technology may be used. Otherwise, another technology such as cell tower triangulation or GPS may be used.
  • Controller circuit 167 of user attached monitor device 110 at times functions in conjunction with cellular transceiver 168 to send and receive data and signals through wide area communication network 150. This link at times is useful for passing information and/or control signals between a central monitoring system (not shown) and user attached monitor device 110. The information transmitted may include, but is not limited to, location information, alcohol information, and information about the status of user attached monitor device 110. Based on the disclosure provided herein, one of ordinary skill in the art will recognize a variety of information that may be transferred via wide area communication network 150.
  • Various embodiments of user attached monitor device 110 include a variety of sensors capable of determining the status of user detached monitor device 120, and of the individual associated therewith. For example, a status monitor 166 may include one or more of the following subcomponents: power status sensor 196 capable of indicating a power status of user detached monitor device 120. The power status may be expressed, for example as a percentage of battery life remaining. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of forms in which power status may be expressed. In addition, user attached monitor device 110 includes a set of shielding sensors 169 that are capable of determining whether user attached monitor device 110 is being shielded from receiving GPS signals and/or if GPS jamming is ongoing, a set of device health indicators 154, a tamper sensor 131 capable of determining whether unauthorized access to user attached monitor device 110 has occurred or whether user attached monitor device 110 has been removed from an associated individual being monitored, a motion/proximity sensor 152 capable of determining whether user attached monitor device 110 is moving and/or whether it is within proximity of an individual associated with user detached monitor device 120, and/or an alcohol sensor 153. Such an alcohol sensor may be any alcohol sensor capable of estimating an amount of alcohol in the individual being monitored. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of alcohol sensors and corresponding alcohol sensing circuitry that may be used in relation to different embodiments. Based on the disclosure provided herein, one of ordinary skill in the art will recognize a variety of shielding sensors, a variety of device health transducers and indicators, a variety of tamper sensors, various different types of motion sensors, different proximity to human sensors, and various human body physical measurement sensors or transducers that may be incorporated into user attached monitor device 110 according to various different instances and/or embodiments.
  • Turning to FIG. ld, a user attached monitor device 1089 is shown with an example attachment element 1090 connected at opposite ends of user attached monitor device 1089 (i.e., a first end 1097 and a second end 1098). Attachment element 1090 is operable to securely attach a tracking device 1095 (i.e., a combination of user attached monitor device 1089 and attachment element 1090) to a limb of an individual in accordance with some embodiments. In various embodiments, attachment element 1090 includes electrically and/or optically conductive material used to make a conductive connection form first end 1097 to second end 1098 through attachment element 1090 and is used in relation to determining whether user attached monitor device 1089 remains attached and/or has been tampered with. While FIG. 1d shows a strap as an example attachment element, based upon the disclosure provided herein, one of ordinary skill in the art will recognize other types of attachment elements that may be used in relation to different embodiments.
  • Turning to FIG. 2, a flow diagram 200 shows a method for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes in accordance with some embodiments. This method may be used in relation to a user detached monitor device, a user attached monitor device, or a combination of a user attached monitor device and a user detached monitor device. Such a user detached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1b . As another example, the user detached monitor device may be a mobile phone including one or more applications allowing operation of the method. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user detached monitor devices that may be used in relation to different embodiments. The user attached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1c . Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user attached monitor devices that may be used in relation to different embodiments. The monitor may be any individual or automated machine capable of setting a schedule for an individual subject to the monitoring. As one example, a monitor may be a parole officer. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of monitors that may operate in relation to different embodiments.
  • Following flow diagram 200, a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 205). Such a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network. As just some examples, the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • The check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. The monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur. The monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur. The monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor. The server system then randomly schedules the desired number of check-in to occur during the set random check-in period. Preferably, if the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.), the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle. In addition, or as an alternative, the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • Additionally, for each scheduled check-in, there may exist a check-in window (i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system). The monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 210). The check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website. The monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows. In some embodiments, the monitor may assign unique check-in windows to the check-in periods. In some embodiments, the check-in window may not exceed a predetermined duration.
  • Once the check-in schedule and check-in window(s) are received, any conflicts or overlaps between check-in times and windows are identified (block 215). For example, if check-in periods are scheduled for every other hour of the day with check-in windows of one hundred eighty (180) minutes, then successive check-in periods would overlap with the check-in windows of the prior check-in period. This is an undesirable result, as it may encourage users to perform a single check-in or two check-ins close in time during the overlapping period, so as to provide the individual being monitored more time before the next scheduled check-in in which to go out-of-bounds. This undesirable result may also occur even with where check-in periods abut or are very close without actually overlapping. Consequently, in some embodiments, a conflict may be identified where there is an insufficient buffer period between scheduled check-ins such that the temptation for the individual being monitored to go out-of-bounds is not sufficiently mitigated.
  • It is determined whether there are any conflicts represented in the check-in times and windows (block 220). Where one or more conflicts are identified (block 220), one or more of the check-in times or check-in windows are modified to resolve the identified conflict(s) (block 225). This conflict resolution may be done automatically or under direction of the monitor. The selected schedule is then uploaded from the remote monitor station to the user detached monitoring device (block 230).
  • During operation of the user detached monitoring device it is determined whether the schedule indicates a check-in time (block 235). Where a check-in time is indicated (block 235), the individual being monitored (i.e., the expected user of the user detached monitoring device) is alerted of the check-in requirement (block 240). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device. The alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device. As another example, the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • It is determined whether the required check-in information was received from the user detached monitoring device within the expected window of time (block 245). If the required information is not received (block 245), a check-in failure is indicated (block 250). When such a check-in failure is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and an indication of the check-in failure. Alternatively, if the required information is received (block 245), a check-in success is indicated (block 255). When such a check-in success is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information).
  • In some cases, all data gathered by the user detached monitoring device is time stamped. Such time stamp data may be generated from a clock in association with the administered check-in. The timestamp data reflects the time and/or date in which the check-in was administered, and may be transmitted to the remote monitoring system in association with the check-in. In some embodiments, the remote monitoring system operates according to a default time (e.g., coordinated universal time or UTC time) while the location monitoring device operates according to the clock time of the user detached monitor device. In some embodiments, during a period of connectivity, the clock time of the user detached monitor device may be reset to match the default time. In such circumstances, any time stamp data transmitted prior to the reset may be prorated to generate a modified timestamp reflecting the date/time of the administered check-in according to the default time. For example, when a periodic check-in occurs and it is determined that the clock time is, for example, five (5) seconds behind the default time, the timestamp data for the associated check-in transmitted at the check-in is modified by that five (5) second discrepancy to reflect the time of the administered check-in according to the default time. In this manner, the timestamp data for each administered check-in stored by the monitoring station is according to a uniform date/time standard (e.g., according to the default time).
  • The location and user identification information provided by the user detached monitoring device to the remote monitoring system may be utilized by the remote monitoring system to generate one or more reports. Such reports may include the data from one or more check-ins. In some cases, other data in addition to the check-in data is included in the reports. In some embodiments, the reports are generated automatically at specified intervals (e.g., daily, weekly, monthly, or per check-in). The generated reports may be accessed by the monitor via the user interaction system or an interactive web portal to the server supported website, whereby the monitor may review one or more reports online. In some embodiments, the generated reports may be emailed or text messaged to the email account or cellular phone of the monitor, respectively. In some embodiments, the generated reports may also be provided to the individual being monitored. Such updates to the individual being monitored may be made via email or text, or as a post on a social media account accessed by the individual being monitored.
  • In some embodiments, the system provides a text-message opt-in option. When, through registration, a mobile number is added or updated on the website, the system identifies if the number has previously been blacklisted or confirmed. If it has not been either, the system texts an invitation to that number to opt-in to receive text-message alerts and/or reports. If the monitor and/or individual being monitored responds to the invite with a “SUBSCRIBE” response, the number is marked as confirmed and from that point forward is able to receive text messages from the system. At any time, the monitor and/or individual being monitored may text “STOP” to unsubscribe.
  • The web portal may contain functionality allowing the monitor to: add/delete/edit monitor contact information; select for each monitor contact the circumstances (e.g. missed/failed check-ins, daily, weekly, monthly) and methods (e.g. text or email) in which the monitor will receive automated reports and/or alerts. Each of these functionalities, as well as the functionalities of other web portals may be implemented in part or in whole via monitor/user fillable fields, drop down menus and/or selectable icons.
  • As discussed herein, the generated reports may include more or less information than what is described herein, but which is nonetheless apparent to one of ordinary skill in the art as desirable for effective monitoring. Accordingly, in some embodiments, the generated report may comprise an alert, which is a report with limited information transmitted to the monitor so that the monitor may be apprised of an important event such as a missed/failed check-in. The alert, for example, may include a text message that identifies the individual being monitored and the important event. Upon receiving the alert, the monitor may access the monitoring station (e.g. the server supported website) and review the generated report having all the requested information. As with the previously described reports, it is contemplated that the monitor may customize his/her preferences regarding the alerts not only with regards to the information provided, but as to how the alerts are transmitted and/or displayed.
  • In some circumstances, the monitor may be responsible for monitoring a plurality of individuals being monitored. In such circumstances, the teachings described herein are applicable to the plurality of individuals being monitored. Further, the generated report may be a combined report, viewable via the server supported website, containing hyperlinks or other access to the reports of each individual being monitored.
  • Turning to FIG. 3, a flow diagram 300 shows a method for interaction between a user detached monitoring device and a remote monitoring station including ambiguity reduction check-in processes in accordance with various embodiments. Following flow diagram 300, a individual being monitored is alerted of a check-in requirement (block 305). This alert may be generated locally by a user detached monitoring device based upon a previously downloaded schedule. This alert may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device. In addition, the user is notified of the check-in requirements (block 310). The alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information for the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device. As another example, the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has one twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • The relevant check-in sensors within the user detached monitoring device are turned on (block 315), and the location information for the user detached monitoring device is updated (block 320). It is determined whether the required check-in information was received by the user detached monitoring device (block 325). If the required information is not received (block 325), it is determined if a timeout condition occurred (block 330). Where the timeout condition has not been met, it is again determined whether the required check-in information was received by the user detached monitoring device (block 325). Where, on the other hand, the timeout condition does occur (block 330), the timeout condition and the location information are transmitted from the user detached monitoring device to the remote monitoring system (block 335). Alternatively, where the required check-in information was received by the user detached monitoring device (block 325), the check-in information and the location information are transmitted from the user detached monitoring device to the remote monitoring system (block 340).
  • The remote monitoring system performs various processes based upon the received information. In particular, where a timeout condition was reported by the user detached monitoring device (block 335), the remote monitoring system indicates a check-in failure and records the location provided from the user detached monitoring device (block 355). Alternatively, where the required check-in information was received from the user detached monitoring device (block 340), the check-in information is analyzed by the remote monitoring system to determine whether it is authentic (block 345). This may include, for example, comparing a face picture of the individual being monitored received as part of the identification information with a reference photo of the individual being monitored maintained in the remote monitoring system using facial recognition software. As another example, this may include comparing a thumb print received as the identification information with a reference thumb print maintained in remote monitoring system.
  • Based upon the aforementioned analysis (block 345), it is determined whether the individual providing the identification information via user detached monitoring device is the individual being monitored expected to be associated with the device (i.e., the target of the monitoring) (block 350). Where the individual being monitored is authenticated as the expected individual being monitored (block 350), the remote monitoring system indicates a check-in success and records the location information and identification received as part of the check-in (block 360). Alternatively, where the individual being monitored is not authenticated as the expected individual being monitored (block 350), the remote monitoring system indicates a check-in failure and records the location provided from the user detached monitoring device (block 355).
  • Some embodiments implement the user detached monitoring device as part of a smart phone or other personal smart device, such as a PDA or the like. In such a system, a schedule is created according to which the check-ins are to be administered. As detailed above, the schedule may be generated and/or stored by the server system based on input provided by the monitor. Reference data is provided to the remote monitoring system by one or more of the monitor, the individual being monitored, and the user detached monitoring device. The reference data may include reference identification information data against which to compare check-in associated identification information data. For example, the reference identification information data may include an image of the individual being monitored against which facial recognition software may be used to compare check-in image data of the individual being monitored. For example, the reference identification information data may include a reference thumb print or other reference biometric data against which to compare the check-in associated identification information data. The reference data may further include reference location data against which to compare check-in associated location data to determine whether the individual being monitored is out-of-bounds. The reference location data may be, for example, a defined distance vector (e.g., a predetermined radius) from a geographic location—and out-of-bounds may be defined as either within or without the distance vector. The reference data is retrievably stored by the monitoring station, which utilizes it as described herein to compare against check-in associated data, thereby determining the appropriate check-in result (e.g., missed, failed, passed).
  • Subsequently, the schedule may be accessed by the monitoring device so as to prompt the individual being monitored to initiate scheduled check-ins. The schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. For example, a bump reminder may appear on the smart phone of the individual being monitored prompting the scheduled check-in.
  • In response to the schedule, the individual being monitored of the user detached monitoring device administers the check-in. This occurs by the individual being monitored engaging the identification information sensor(s) so as to generate the identification information data. For example, for a retinal scan or facial recognition sensing, the individual being monitored may orient the smart phone camera to capture his/her eye or face. For example, for a thumbprint or other biometric scan, the individual being monitored may place his thumbprint onto the touch-screen of the smart phone to be read thereby.
  • The location data is more or less contemporaneously generated with the identification information data so as to guard against forgery. In some embodiments, the identification information data generation may require that the individual being monitored hold the engagement of the identification information sensor (e.g., hold his/her thumb in place, or hold the camera focused on his/her face) for a predetermined period while the location data is being generated.
  • Once generated, the location data and the identification information data are transmitted from the user detached monitoring device to the remote monitoring system in accordance with the schedule, as described above. When the data associated with the scheduled check-in is not received by the remote monitoring system in accordance with the schedule, the scheduled check-in may be associated with a ‘missed’ result. When the data associated with the scheduled check-in fails to match the reference data, the scheduled check-in may be associated with a ‘failed’ result.
  • The location and/or identification information data and/or results may be utilized by the system to generate one or more reports based thereon. Such reports may include the data (and other data) from one or more administered and/or scheduled check-ins. The generated reports may be accessed by the monitor via the interactive web portal to the server supported website, whereby the monitor may review one or more reports online. In some embodiments, the generated reports may be e-mailed or text messaged to the e-mail account or cellular phone of the monitor, respectively.
  • Additional details of the aforementioned features and others in the context of sobriety monitoring may be found in U.S. Pat. No. 8,707,758, issued on Apr. 29, 2014; U.S. Pat. No. 8,381,573, issued on Sep. 15, 2010; and U.S. application Ser. No. 13/274,553, filed on Oct. 17, 2011, the disclosures and contents of which are herein incorporated by reference in their entirety. Additional details of these features and others may also be found in the figures filed herewith, the entire disclosure and contents of which is herein incorporated by reference in its entirety.
  • Turning to FIG. 4, a flow diagram 400 shows a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station. The method includes scheduling and check-in processes using data accessed from a user detached monitor device and use of a user attached monitor device to provide automatic updates. Following flow diagram 400, a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 405). Such a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network. As just some examples, the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • The check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. The monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur. The monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur. The monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor. The server system then randomly schedules the desired number of check-in to occur during the set random check-in period. Preferably, if the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.), the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle. In addition, or as an alternative, the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • Additionally, for each scheduled check-in, there may exist a check-in window (i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system). The monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 410). The check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website. The monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows. In some embodiments, the monitor may assign unique check-in windows to the check-in periods. In some embodiments, the check-in window may not exceed a predetermined duration.
  • In parallel, a schedule is accessed from a user detached monitor device by a remote monitor station (block 415). The accessed schedule is under control of the individual being monitored and possibly represents a schedule that the individual envisions following. One of the struggles with introducing an offender back into society is getting that individual to take control of their lives and to perform activities on a schedule dictated by them. The individual is trained to begin directing their life, and to design and keep to a schedule. By using the individual's schedule as part of designing a monitoring program, any monitoring performed can be used to reinforce the schedule. The schedule is compared with the check-in schedule to determine whether there are any conflicts that the monitor desires to respect (block 420). For example, a monitor may respect an individual's time at work, but may not respect an individual's planned workout time. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of scheduled events that may be respected and others that are not respected.
  • It is determined whether there are any respected conflicts represented in the check-in times and windows (block 425). Where one or more respected conflicts are identified (block 425), an automated check-in using the user attached monitor device is selected for the respective check-in times and a manual check-in using the user detached monitor device is selected for the other check-in times (block 430). The schedule including manual check-in times is uploaded from the remote monitor station to the user detached monitoring device, and the schedule including automated check in times is uploaded to the user attached monitor device (block 435).
  • During operation, it is determined whether the schedule indicates a check-in time (block 440). Where the scheduled check-in was uploaded to the user detached monitor device it is identified as a manual check-in (block 445) and the individual being monitored (i.e., the expected user of the user detached monitoring device) is alerted of the check-in requirements (block 450). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device. The alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device. As another example, the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • Alternatively, where the scheduled check-in was uploaded to the user attached monitor device it is identified as an automatic check-in (i.e., not a manual check-in) (block 445) and the user attached monitor device automatically gathers status and performs the check-in process without involving the individual being monitored (block 460). The status may include, but is not limited to, a time stamp, a location of the user attached monitor device, and/or whether the user attached monitor device is within communication range of the user detached monitor device. Determining whether the user attached monitor device is within communication range of the user detached monitor device may be done, for example, by sending a communication between the user detached monitor device and the user attached monitor device that allows one or both of the devices to know that the other is within communication proximity. In some cases, this may be done by the user attached monitor device sending a Bluetooth™ request to the user attached monitor device and awaiting a response. Upon receiving the request, the user detached monitor device knows it is within proximity of the user attached monitor device. Upon receiving the response, the user attached monitor device knows it is within proximity of the user detached monitor device. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of processes and/or communication protocols that may be used in relation to different embodiments to discern device proximity. Further, based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of status that can be gathered by the user attached monitor device without involving the individual being monitored.
  • It is determined whether the required check-in information was received from the user detached monitoring device or the user attached monitoring device by the remote monitoring station within the expected window of time (block 465). If the required information is not received (block 465), a check-in failure is indicated (block 470). When such a check-in failure is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and an indication of the check-in failure. Alternatively, if the required information is received (block 465), a check-in success is indicated (block 475). When such a check-in success is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information). Time stamping and report generation may be done similar to that discussed above in relation to FIG. 2.
  • Turning to FIG. 5, a flow diagram 500 shows a method in accordance with some embodiments for interaction between a user detached monitoring device and a remote monitoring station including scheduling and check-in processes using data accessed from a user detached monitor device. In the method, a conflict is purposely created with a schedule accessed from the user detached monitor device. Following flow diagram 500, a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 505). Such a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network. As just some examples, the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • The check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. The monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur. The monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur. The monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor. The server system then randomly schedules the desired number of check-in to occur during the set random check-in period. Preferably, if the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.), the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle. In addition, or as an alternative, the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • Additionally, for each scheduled check-in, there may exist a check-in window (i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system). The monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 510). The check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website. The monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows. In some embodiments, the monitor may assign unique check-in windows to the check-in periods. In some embodiments, the check-in window may not exceed a predetermined duration.
  • In parallel, a schedule is accessed from a user detached monitor device by a remote monitor station (block 515). The accessed schedule is under control of the individual being monitored and possibly represents a schedule that the individual envisions following. One of the struggles with introducing an offender back into society is getting that individual to take control of their lives and to perform activities on a schedule dictated by them. The individual is trained to begin directing their life, and to design and keep to a schedule. By using the individual's schedule as part of designing a monitoring program, any monitoring performed can be used to reinforce the schedule. The schedule is compared with the check-in schedule to determine whether there are any conflicts that the monitor desires to respect (block 520). For example, a monitor may respect an individual's time at work, but may not respect an individual's planned workout time or an individual's social calendar. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of scheduled events that may be respected and others that are not respected.
  • The monitor may then adjust the check-in schedule and/or check-in windows create a conflict with non-respected scheduled events (block 525). This modified check-in schedule including check-in windows is uploaded from the remote monitor station to the user detached monitoring device (block 535).
  • During operation of the user detached monitoring device it is determined whether the schedule indicates a check-in time (block 540). Where a check-in time is indicated (block 540), the individual being monitored (i.e., the expected user of the user detached monitoring device) is alerted of the check-in requirement (block 545). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device. The alert may include instructions indicating to the individual being monitored a time limit for checking in and what identification information from the individual being monitored is to be provided as part of the check-in. For example, the alert may indicate that the individual being monitored has thirty (30) minutes to check-in and must take a picture of their face using the camera in the user detached monitoring device. As another example, the alert may indicate that the individual being monitored has twenty (20) minutes to check-in and must take a thumb print using the biometric circuitry included in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has one hour to record a message included in the alert using the microphone in the user detached monitoring device. As yet another example, the alert may indicate that the individual being monitored has twenty (20) minutes to both record a message included in the alert using the microphone in the user detached monitoring device and take a face shot using the camera included in the user detached monitoring device.
  • It is determined whether the required check-in information was received from the user detached monitoring device within the expected window of time (block 550). If the required information is not received (block 550), a check-in failure is indicated (block 555). When such a check-in failure is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and an indication of the check-in failure. Alternatively, if the required information is received (block 550), a check-in success is indicated (block 560). When such a check-in success is indicated, a message is sent from the user detached monitoring device to the remote monitoring station that includes recent location information for the user detached monitoring device and the gathered user identification information (i.e., a subset of the required check-in information). By allowing a monitor to create purposeful conflicts with a schedule of the individual being monitored, a check-in demand occurring during the scheduled event may serve as a gentle reminder to the individual being monitored to be careful while engaged in the scheduled event.
  • Turning to FIG. 6, a flow diagram 600 shows a method for interaction between a user detached monitoring device and both a remote monitoring station and a user attached monitor device including scheduling and check-in processes in accordance with some embodiments. Such a user detached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1b . As another example, the user detached monitor device may be a mobile phone including one or more applications allowing operation of the method. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user detached monitor devices that may be used in relation to different embodiments. The user attached monitor device may be, for example, similar to the user detached monitor device discussed above in relation to FIG. 1c . Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of user attached monitor devices that may be used in relation to different embodiments. The monitor may be any individual or automated machine capable of setting a schedule for an individual subject to the monitoring. As one example, a monitor may be a parole officer. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of monitors that may operate in relation to different embodiments.
  • Following flow diagram 600, a check-in schedule is set up by a monitor accessing the system via a user interaction device (block 605). Such a user interaction device may be, but is not limited to, a network connected user interface device communicatively coupled via a network to a remote monitoring system and/or directly to a user detached monitor device via a wireless communication network. As just some examples, the user interaction device may be a mobile phone, a mobile computer, or a fixed computer station. Based upon the disclosure provided herein one of ordinary skill in the art will recognize a variety of user interaction devices that may be used in relation to different embodiments.
  • The check-in schedule may consist of predetermined check-in periods, random check-in periods, and/or on-demand check-in periods. The monitor sets a predetermined check-in period by selecting a single date/time option for the check-in to occur. The monitor may set multiple predetermined check-in periods by selecting a plurality of single dates/times for the check-in to occur. The monitor sets a random check-in period by selecting a continuous range of date/time options that reflect the temporal bounds within which the monitor desires the check-in to randomly occur, and additionally selects the number of check-ins the monitor desires to be taken during the random check-in period. As the selection consists of a range that may be resized or otherwise tailored according to the preference of the monitor. The server system then randomly schedules the desired number of check-in to occur during the set random check-in period. Preferably, if the generated schedule is a periodic schedule (e.g. weekly, bi-weekly, monthly, etc.), the randomly generated check-ins are re-randomized within each set random check-in period for each successive schedule cycle. In addition, or as an alternative, the monitor may also select an on-demand check-in, reflecting a desire to schedule an immediate check-in (or as closely thereto as practical). In some cases, such on-demand check-ins are not recycled to the next schedule cycle, but are implemented once and discarded.
  • Additionally, for each scheduled check-in, there may exist a check-in window (i.e., a period of time from the inception of the check-in period during which the scheduled check-in can be taken by the user before the check-in is considered missed by the system). The monitor may set up check-in windows for each time in the check-in schedule or may set up a single check in window that is used in relation with all times in the check-in schedule (block 610). The check-in window may be a default check-in window, or may be generated or otherwise modified by the monitor, preferably via the server supported website. The monitor may select from a plurality of predetermined options for the check-in window, including, for example, thirty (30) minutes, sixty (60) minutes, one hundred twenty (120) minutes, one hundred eighty (180) minutes, two hundred forty (240) minutes, or custom duration check-in windows. In some embodiments, the monitor may assign unique check-in windows to the check-in periods. In some embodiments, the check-in window may not exceed a predetermined duration.
  • Once the check-in schedule and check-in window(s) are received, any conflicts or overlaps between check-in times and windows are identified (block 615). For example, if check-in periods are scheduled for every other hour of the day with check-in windows of one hundred eighty (180) minutes, then successive check-in periods would overlap with the check-in windows of the prior check-in period. This is an undesirable result, as it may encourage users to perform a single check-in or two check-ins close in time during the overlapping period, so as to provide the individual being monitored more time before the next scheduled check-in in which to go out-of-bounds. This undesirable result may also occur even with where check-in periods abut or are very close without actually overlapping. Consequently, in some embodiments, a conflict may be identified where there is an insufficient buffer period between scheduled check-ins such that the temptation for the individual being monitored to go out-of-bounds is not sufficiently mitigated.
  • It is determined whether there are any conflicts represented in the check-in times and windows (block 620). Where one or more conflicts are identified (block 620), one or more of the check-in times or check-in windows are modified to resolve the identified conflict(s) (block 625). This conflict resolution may be done automatically or under direction of the monitor. The selected schedule is then uploaded from the remote monitor station to the user detached monitoring device (block 630).
  • During operation of the user detached monitoring device it is determined whether the schedule indicates a check-in time (block 635). Where a check-in time is indicated (block 635), the individual being monitored (i.e., the expected user of the user detached monitoring device) is alerted of an ongoing automated check-in (block 640). This may be done using one or more of a speaker, vibrator, or visual display included in the user detached monitoring device.
  • It is determined whether the user detached monitor device is within communication range of the user attached monitor device (block 645). This may be done, for example, by sending a communication between the user detached monitor device and the user attached monitor device that allows one or both of the devices to know that the other is within communication proximity. In some cases, this may be done by the user attached monitor device sending a Bluetooth™ request to the user attached monitor device and awaiting a response. Upon receiving the request, the user detached monitor device knows it is within proximity of the user attached monitor device. Upon receiving the response, the user attached monitor device knows it is within proximity of the user detached monitor device. Based upon the disclosure provided herein, one of ordinary skill in the art will recognize a variety of processes and/or communication protocols that may be used in relation to different embodiments to discern device proximity.
  • The result of the determination of whether the user detached monitor device is within communication range of the user attached monitor device is uploaded to the remote monitor station along with any other relevant information including, but not limited to, time and location of one or both of the user detached monitor device and/or the user attached monitor device (block 650). Where the user detached monitor device is within communication range of the user attached monitor device (block 655), a successful check-in is indicated (block 665). Otherwise, a check-in failure is indicated (block 660). Time stamping and report generation may be done similar to that discussed above in relation to FIG. 2.
  • In conclusion, the present invention provides for novel systems, devices, and methods for monitoring individuals and/or assets. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Claims (10)

What is claimed is:
1. A monitoring system, the monitoring system comprising:
a user detached monitor associated with an individual being monitored, wherein the user detached monitor includes:
a sensor configured to receive input from the individual being monitored;
a communication apparatus operable to receive at least a portion of an implemented check-in schedule from a monitoring station via a wireless communication network, wherein the implemented check-in schedule includes: at least one check-in window and a corresponding check-in time, and a check-in instruction indicating the check-in time and an action to be performed in relation to the sensor;
a processor; and
a computer readable medium including instructions executable by the processor to:
alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule;
receive input from the sensor; and
upload the input received from the sensor to the monitoring station.
2. The monitoring system of claim 1, wherein the wireless communication network is a cellular telephone network.
3. The monitoring system of claim 1, wherein the communication apparatus is a first communication apparatus, wherein the computer readable medium is a first computer readable medium, wherein the processor is a first processor, and wherein the monitoring system further includes:
the monitoring station including:
a second communication apparatus configured to communicate with the user detached monitor via a communication link;
a second computer readable medium, the second computer readable medium including instructions executable by a second processor to:
receive an original check-in schedule for the individual being monitored;
identify a conflict with the original check-in schedule;
modify the original check-in schedule to change an aspect of the original check-in schedule related to the conflict to yield the implemented check-in schedule;
upload at least the portion of the implemented check-in schedule to the user detached monitor;
receive check-in information from the user detached monitor; and
determine if the check-in information complies with the portion of the implemented check-in schedule.
4. The monitoring system of claim 3, wherein the second computer readable medium further includes instructions executable by the second processor to:
receive one or more check-in windows associated with two or more check-in times in the original check-in schedule; and
wherein identifying the conflict with the check-in schedule includes:
determining that an end of a check-in window for a first check-in time is within a defined time period of a beginning of a check-in window for a second check-in time; and
indicating the conflict; and
wherein modifying the original check-in schedule to change an aspect of the original check-in schedule in an aspect related to the conflict includes one or more of:
removing one of the first check-in time or the second check-in time from the check-in schedule;
reducing the check-in window of the first check-in time in the check-in schedule; or
reducing the check-in window of the second check-in time in the check-in schedule.
5. The monitoring system of claim 3, wherein the instructions that identify the conflict with the original check-in schedule includes instructions executable by the second processor to:
access an individual schedule from the user detached monitor;
compare the individual schedule with the original check-in schedule, wherein the conflict is found where it is determined that an event in the individual schedule overlaps an event in the original check-in schedule; and
wherein modifying the original check-in schedule to change an aspect of the original check-in schedule related to the conflict includes removing the check-in time corresponding to the conflict to yield the implemented check-in schedule.
6. The monitoring system of claim 10, wherein the first computer readable medium further includes instructions executable by the first processor to:
receive a request for the individual schedule from the monitoring station; and
provide the individual schedule to the monitoring station in response to the request.
7. The monitoring system of claim 1, wherein the monitoring system further includes a user attached monitor, and wherein the user attached monitor includes:
an attachment element configured to attach to a limb of an individual being monitored;
a tamper sensor configured to indicate removal of the user attached monitor from the individual being monitored;
a communication circuit operable to:
receive a portion of the implemented check-in schedule including the check-in time corresponding to the conflict; and
provide status to the monitoring station without interaction with the individual being monitored in accordance with the portion of the implemented check-in schedule.
8. The monitoring system of claim 1, wherein the sensor is selected from a group consisting of: a camera, an audio sensor; a temperature sensor, and a biometric sensor.
9. The monitoring system of claim 1, wherein the sensor is a biometric sensor, and wherein the biometric sensor is selected from a group consisting of: a finger print sensor, and a retinal scan sensor.
10. A monitoring system, the monitoring system comprising:
the monitoring station including:
a first communication apparatus configured to communicate with a user detached monitor associated with an individual being monitored via a cellular telephone network;
a first computer readable medium, the first computer readable medium including instructions executable by a first processor to:
receive an original check-in schedule for the individual being monitored, wherein the original check-in schedule includes at least a first check-in time and a first check-in window corresponding to the first check-in time, and a second check-in time and a second check-in window corresponding to a second check-in time;
identify an internal conflict within the original check-in schedule, wherein the conflict occurs where an end of the first check-in window is within a defined time period of a beginning of the second check-in window; and
modify the original check-in schedule by performing at least one of the following functions to yield an implemented check-in schedule:
removing one of the first check-in time or the second check-in time from the check-in schedule;
reducing the check-in window of the first check-in time in the check-in schedule; or
reducing the check-in window of the second check-in time in the check-in schedule; and
upload at least the portion of the implemented check-in schedule to the user detached monitor; and
the user detached monitor, the user detached monitor including:
a sensor configured to receive input from the individual being monitored;
a second communication apparatus operable to receive at least a portion of an implemented check-in schedule from the monitoring station via the cellular telephone network;
a second computer readable medium including instructions executable by the second processor to:
alert the individual being monitored of a check-in requirement in accordance with the portion of the implemented check-in schedule;
receive input from the sensor; and
upload the input received from the sensor to the monitoring station as check-in information.
US16/937,215 2018-01-01 2020-07-23 Systems and methods for semi-autonomous individual monitoring Active US11164445B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/937,215 US11164445B2 (en) 2018-01-01 2020-07-23 Systems and methods for semi-autonomous individual monitoring
US17/495,711 US11741821B2 (en) 2018-01-01 2021-10-06 Systems and methods for semi-autonomous individual monitoring

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862612650P 2018-01-01 2018-01-01
US16/221,493 US10769932B2 (en) 2018-01-01 2018-12-15 Systems and methods for semi-autonomous individual monitoring
US16/937,215 US11164445B2 (en) 2018-01-01 2020-07-23 Systems and methods for semi-autonomous individual monitoring

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/221,493 Division US10769932B2 (en) 2018-01-01 2018-12-15 Systems and methods for semi-autonomous individual monitoring

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/495,711 Continuation US11741821B2 (en) 2018-01-01 2021-10-06 Systems and methods for semi-autonomous individual monitoring

Publications (2)

Publication Number Publication Date
US20200380852A1 true US20200380852A1 (en) 2020-12-03
US11164445B2 US11164445B2 (en) 2021-11-02

Family

ID=67057700

Family Applications (11)

Application Number Title Priority Date Filing Date
US16/221,494 Active 2039-07-19 US10896596B2 (en) 2018-01-01 2018-12-15 Systems and methods for device load transfer in a hybrid monitoring system
US16/221,497 Active US11037434B2 (en) 2018-01-01 2018-12-15 Systems and methods for monitored individual violation instruction
US16/221,498 Active US11250688B2 (en) 2018-01-01 2018-12-15 Systems and methods for monitored individual progression processing
US16/221,499 Active US10741055B2 (en) 2018-01-01 2018-12-15 Systems and methods for hybrid non-exclusion zone violating route determination
US16/221,495 Active US10650663B2 (en) 2018-01-01 2018-12-15 Systems and methods for multi-device restriction zone maintenance
US16/221,493 Active US10769932B2 (en) 2018-01-01 2018-12-15 Systems and methods for semi-autonomous individual monitoring
US16/843,464 Active US11164444B2 (en) 2018-01-01 2020-04-08 Systems and methods for multi-device restriction zone maintenance
US16/937,215 Active US11164445B2 (en) 2018-01-01 2020-07-23 Systems and methods for semi-autonomous individual monitoring
US17/122,429 Active 2039-06-30 US11837073B2 (en) 2018-01-01 2020-12-15 Systems and methods for device load transfer in a hybrid monitoring system
US17/495,711 Active US11741821B2 (en) 2018-01-01 2021-10-06 Systems and methods for semi-autonomous individual monitoring
US18/506,821 Pending US20240078893A1 (en) 2018-01-01 2023-11-10 Systems and methods for device load transfer in a hybrid monitoring system

Family Applications Before (7)

Application Number Title Priority Date Filing Date
US16/221,494 Active 2039-07-19 US10896596B2 (en) 2018-01-01 2018-12-15 Systems and methods for device load transfer in a hybrid monitoring system
US16/221,497 Active US11037434B2 (en) 2018-01-01 2018-12-15 Systems and methods for monitored individual violation instruction
US16/221,498 Active US11250688B2 (en) 2018-01-01 2018-12-15 Systems and methods for monitored individual progression processing
US16/221,499 Active US10741055B2 (en) 2018-01-01 2018-12-15 Systems and methods for hybrid non-exclusion zone violating route determination
US16/221,495 Active US10650663B2 (en) 2018-01-01 2018-12-15 Systems and methods for multi-device restriction zone maintenance
US16/221,493 Active US10769932B2 (en) 2018-01-01 2018-12-15 Systems and methods for semi-autonomous individual monitoring
US16/843,464 Active US11164444B2 (en) 2018-01-01 2020-04-08 Systems and methods for multi-device restriction zone maintenance

Family Applications After (3)

Application Number Title Priority Date Filing Date
US17/122,429 Active 2039-06-30 US11837073B2 (en) 2018-01-01 2020-12-15 Systems and methods for device load transfer in a hybrid monitoring system
US17/495,711 Active US11741821B2 (en) 2018-01-01 2021-10-06 Systems and methods for semi-autonomous individual monitoring
US18/506,821 Pending US20240078893A1 (en) 2018-01-01 2023-11-10 Systems and methods for device load transfer in a hybrid monitoring system

Country Status (1)

Country Link
US (11) US10896596B2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9821738B2 (en) 2014-06-30 2017-11-21 Raymond Anthony Joao Battery power management apparatus and method
US10896596B2 (en) * 2018-01-01 2021-01-19 Bl Incorporated Systems and methods for device load transfer in a hybrid monitoring system
US10671143B2 (en) * 2018-01-11 2020-06-02 Red Hat Israel, Ltd. Power management using automation engine
US10902613B2 (en) 2019-03-20 2021-01-26 Bi Incorporated Systems and methods for textural zone identification
US10692345B1 (en) 2019-03-20 2020-06-23 Bi Incorporated Systems and methods for textural zone monitoring
US10893383B2 (en) 2019-05-06 2021-01-12 Bi Incorporated Systems and methods for monitoring system equipment diagnosis
US20210006623A1 (en) * 2019-07-01 2021-01-07 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US20210133406A1 (en) * 2019-11-01 2021-05-06 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US11507909B2 (en) 2020-05-21 2022-11-22 Talitrix Holdings, LLC Offender electronic monitoring program compliance assessment and program revision
US11801013B2 (en) 2020-11-12 2023-10-31 Consumer Safety Technology, Llc Method and system of deploying portable breath alcohol monitoring device
US11760227B2 (en) 2021-02-15 2023-09-19 Raymond Anthony Joao Battery power management apparatus and method

Family Cites Families (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4742427A (en) 1986-02-06 1988-05-03 Keytek Instrument Corp. Electrostatic discharge simulation
US4724427A (en) 1986-07-18 1988-02-09 B. I. Incorporated Transponder device
US5731757A (en) 1996-08-19 1998-03-24 Pro Tech Monitoring, Inc. Portable tracking apparatus for continuous position determination of criminal offenders and victims
US6405213B1 (en) 1997-05-27 2002-06-11 Hoyt M. Layson System to correlate crime incidents with a subject's location using crime incident data and a subject location recording device
US6130620A (en) 1997-08-11 2000-10-10 Electronic Monitoring Systems, Inc. Remote monitoring system
US6169484B1 (en) 1998-04-28 2001-01-02 Itt Manufacturing Enterprises, Inc. Personal location system
US6054928A (en) * 1998-06-04 2000-04-25 Lemelson Jerome H. Prisoner tracking and warning system and corresponding methods
US7905832B1 (en) 2002-04-24 2011-03-15 Ipventure, Inc. Method and system for personalized medical monitoring and notifications therefor
US6393362B1 (en) 2000-03-07 2002-05-21 Modular Mining Systems, Inc. Dynamic safety envelope for autonomous-vehicle collision avoidance system
US6323773B1 (en) 2000-06-16 2001-11-27 Battelle Memorial Institute Alerting device and method for reminding a person of a risk
US7015817B2 (en) 2002-05-14 2006-03-21 Shuan Michael Copley Personal tracking device
US6774799B2 (en) 2002-06-03 2004-08-10 Pro Tech Monitoring, Inc. House arrest tracker system
US6998985B2 (en) * 2003-03-05 2006-02-14 Dmatek, Ltd. Monitoring and tracking network
US7123141B2 (en) 2003-08-20 2006-10-17 Contestabile Robert A Electronic monitoring systems and methods
US7940746B2 (en) * 2004-08-24 2011-05-10 Comcast Cable Holdings, Llc Method and system for locating a voice over internet protocol (VoIP) device connected to a network
WO2006028307A1 (en) 2004-09-09 2006-03-16 Krcd Co., Ltd. Multiple stapling apparatus
US7119695B2 (en) * 2004-11-15 2006-10-10 Pro Tech Monitoring, Inc. Advanced house arrest tracker system
US20070023496A1 (en) * 2005-04-13 2007-02-01 Hall Christopher J House arrest apparatus
US20070125816A1 (en) * 2005-12-06 2007-06-07 Myers Steven B Locking mechanism for use with ratchet or cog strap
US7394782B2 (en) 2005-07-14 2008-07-01 Honeywell International Inc. Reduced power time synchronization in wireless communication
US7619533B2 (en) 2006-01-07 2009-11-17 Streetime Technologies Llc Method and apparatus for monitoring persons
US20070171047A1 (en) * 2006-01-25 2007-07-26 Goodman Gregory D Device and system for locating and providing status of persons, animals or objects
US7382268B2 (en) 2006-06-13 2008-06-03 Hartman Kevin L Device and method for tethering a person wirelessly with a cellular telephone
US8797210B2 (en) 2006-07-14 2014-08-05 Securealert, Inc. Remote tracking device and a system and method for two-way voice communication between the device and a monitoring center
US7737841B2 (en) 2006-07-14 2010-06-15 Remotemdx Alarm and alarm management system for remote tracking devices
US7886648B2 (en) 2006-10-07 2011-02-15 Kevin Williams Systems and methods for area denial
US7930927B2 (en) 2007-03-06 2011-04-26 Bi Incorporated Transdermal portable alcohol monitor and methods for using such
US9276884B2 (en) * 2007-06-29 2016-03-01 Aquila Vision Corporation Intelligent notification system and method
DK2159258T3 (en) 2008-08-26 2011-11-21 Omya Development Ag Treated mineral filler products, processes for their preparation and uses thereof
US8493219B2 (en) 2008-11-14 2013-07-23 Bi Incorporated Systems and methods for adaptive monitoring and tracking of a target having a learning period
US8334766B2 (en) * 2009-04-01 2012-12-18 RFID Mexico, S.A. DE C.V. Tracking system
US8352111B2 (en) 2009-04-06 2013-01-08 GM Global Technology Operations LLC Platoon vehicle management
US8516514B2 (en) * 2009-10-15 2013-08-20 At&T Intellectual Property I, L.P. System and method to monitor a person in a residence
US9355548B2 (en) 2009-12-03 2016-05-31 Bi Incorporated Systems and methods for contact avoidance
US8629776B2 (en) 2009-12-03 2014-01-14 Bi Incorporated Systems and methods for disrupting criminal activity
US8576065B2 (en) 2009-12-03 2013-11-05 Bi Incorporated Systems and methods for variable collision avoidance
US8489113B2 (en) 2010-02-09 2013-07-16 Omnilink Systems, Inc. Method and system for tracking, monitoring and/or charging tracking devices including wireless energy transfer features
US8659418B2 (en) * 2010-02-18 2014-02-25 Stephanie Sue Ling Kreml Devices and methods for behavior assessment and modification
US9092963B2 (en) * 2010-03-29 2015-07-28 Qualcomm Incorporated Wireless tracking device
US20110260870A1 (en) * 2010-04-21 2011-10-27 Melanie Bailey Method of preventing an inmate from committing suicide
EP2614492A1 (en) 2010-09-06 2013-07-17 Aurizon Operations Limited A worker protection method
US8744803B2 (en) * 2010-09-30 2014-06-03 Fitbit, Inc. Methods, systems and devices for activity tracking device data synchronization with computing devices
US8456298B2 (en) * 2010-11-02 2013-06-04 Timo Valtonen Apparatus and method for portable tracking
US9324223B2 (en) 2012-06-08 2016-04-26 3M Innovative Properties Company Electronic monitoring home unit and installation methods
US9668095B1 (en) 2012-07-10 2017-05-30 Bi Incorporated Systems and methods for supporting zones in a monitoring system
US9241661B2 (en) * 2012-09-17 2016-01-26 TraceX, Inc. Apparatus and method for extra-corporal chemical detection and monitoring
US9171048B2 (en) 2012-12-03 2015-10-27 Wellclub, Llc Goal-based content selection and delivery
US9041535B2 (en) 2012-12-26 2015-05-26 3M Innovative Properties Company Signal blocking detection in offender monitoring systems
US9240118B2 (en) 2013-03-14 2016-01-19 Bi Incorporated Systems and methods for beacon tethering in a monitoring system
WO2014182638A2 (en) * 2013-05-04 2014-11-13 Christopher Decharms Mobile security technology
KR102018378B1 (en) * 2013-07-08 2019-09-04 엘지전자 주식회사 Electronic Device And Method Of Controlling The Same
US9498163B2 (en) * 2013-10-10 2016-11-22 Pushd, Inc. Automated location and activity aware medical monitoring
US20150123766A1 (en) 2013-11-01 2015-05-07 Jerry St. John Escalating biometric identification
US9041532B1 (en) 2013-11-05 2015-05-26 General Electric Company Methods and systems for managing wireless devices
US9629420B2 (en) 2013-11-11 2017-04-25 Bi Incorporated Systems and methods for reducing false negative tamper detection
KR102306064B1 (en) * 2014-02-14 2021-09-30 쓰리엠 이노베이티브 프로퍼티즈 캄파니 Activity recognition using accelerometer data
US9423487B2 (en) 2014-03-26 2016-08-23 Bi Incorporated Systems and methods for pursuit governance in a monitoring system
US9989649B2 (en) 2014-05-06 2018-06-05 Bi Incorporated Systems and methods for power efficient tracking
US20160081587A1 (en) * 2014-09-22 2016-03-24 Ohanes D. Ghazarian Biometric GPS breathalyzer apparatus
US9489819B2 (en) * 2014-10-21 2016-11-08 Anytransactions, Inc. Personal monitor and tracking system
WO2016065350A1 (en) 2014-10-24 2016-04-28 Levitate Technologies, Inc. Arm support systems
US9582982B2 (en) * 2014-11-06 2017-02-28 Numerex Corp. Method and system for energy management of an offender monitor
AU2015353736A1 (en) * 2014-11-25 2017-06-15 Fynd Technologies, Inc. Geolocation bracelet, systems, and methods
CN104359486A (en) 2014-11-28 2015-02-18 百度在线网络技术(北京)有限公司 Method for updating vehicular navigation map, vehicular navigation equipment and system
US20160267770A1 (en) * 2015-03-11 2016-09-15 Bi Incorporated Systems and Methods for Loose Monitoring of Targets
WO2016164485A1 (en) 2015-04-08 2016-10-13 Amiigo, Inc. Dynamic adjustment of sampling rate based on a state of the user
US10609336B2 (en) * 2015-04-16 2020-03-31 Offender Smartphone Monitoring, LLC Monitoring process
US20160310065A1 (en) * 2015-04-24 2016-10-27 Umm Al-Qura University Spinal cord posture monitoring system in anterior/posterior and lateral directions
WO2016178617A1 (en) * 2015-05-04 2016-11-10 Kontigo Care Ab Method and device for estimating a risk of relapse of addictive behaviour
WO2017027919A1 (en) 2015-08-17 2017-02-23 Find-Me Technologies Pty Ltd Tracking system and method
US10008099B2 (en) * 2015-08-17 2018-06-26 Optimum Id, Llc Methods and systems for providing online monitoring of released criminals by law enforcement
CN105050081B (en) * 2015-08-19 2017-03-22 腾讯科技(深圳)有限公司 Method, device and system for connecting network access device to wireless network access point
US10341204B2 (en) * 2015-11-11 2019-07-02 Under Armour, Inc. Methods and apparatus for device management
US10332381B2 (en) * 2016-04-05 2019-06-25 Tech Traks, Inc. Intelligent asset detachment sensor system
KR102098137B1 (en) 2016-04-15 2020-04-08 가부시키가이샤 덴소 System and method for setting real-time location
US10048081B2 (en) 2016-04-26 2018-08-14 Earthsweep Llc Method and system for electronic monitoring
CA3030761A1 (en) * 2016-07-13 2018-01-18 Palarum, LLC Patient monitoring system
US10068462B2 (en) 2016-09-29 2018-09-04 Bi Incorporated Systems and methods for manual tamper reset in a monitoring system
US10524089B2 (en) * 2016-11-01 2019-12-31 Justin Villani Method and system of pairing a receiving device to an external communications interface to create an enforceable dynamic boundary and geolocation system
US9990826B1 (en) * 2016-12-07 2018-06-05 Global Tel*Link Corporation System for monitoring offender during correctional supervisory program
WO2018112048A1 (en) * 2016-12-15 2018-06-21 Williams David H Systems and methods for providing location-based security and/or privacy for restricting user access
KR20180074316A (en) * 2016-12-23 2018-07-03 삼성전자주식회사 System for providing plce information and electronic device and method supporting the same
US11880493B2 (en) * 2017-03-27 2024-01-23 Global Tel*Link Corporation Wearable devices in a controlled environment
US20180288226A1 (en) * 2017-04-03 2018-10-04 Avaya Inc. High performance distributed computer work assignment engine
US20180308342A1 (en) * 2017-04-25 2018-10-25 Global Tel*Link Corporation Emergency alert system for controlled environment
EP3638117A4 (en) * 2017-06-16 2021-08-04 Attenti Electronic Monitoring LTD. Activity-based rules for compliance detection using body-worn offender monitoring electronic devices
US10068398B1 (en) 2017-08-03 2018-09-04 Global Tel*Link Corporation Release monitoring through check-in and tethering system
US10896596B2 (en) * 2018-01-01 2021-01-19 Bl Incorporated Systems and methods for device load transfer in a hybrid monitoring system

Also Published As

Publication number Publication date
US20190204099A1 (en) 2019-07-04
US11164444B2 (en) 2021-11-02
US20240078893A1 (en) 2024-03-07
US20200234561A1 (en) 2020-07-23
US20190208355A1 (en) 2019-07-04
US10769932B2 (en) 2020-09-08
US11741821B2 (en) 2023-08-29
US20190206221A1 (en) 2019-07-04
US20210097847A1 (en) 2021-04-01
US11837073B2 (en) 2023-12-05
US20190206229A1 (en) 2019-07-04
US10650663B2 (en) 2020-05-12
US11250688B2 (en) 2022-02-15
US10741055B2 (en) 2020-08-11
US11037434B2 (en) 2021-06-15
US20220028250A1 (en) 2022-01-27
US10896596B2 (en) 2021-01-19
US20190204903A1 (en) 2019-07-04
US20190206222A1 (en) 2019-07-04
US11164445B2 (en) 2021-11-02

Similar Documents

Publication Publication Date Title
US11741821B2 (en) Systems and methods for semi-autonomous individual monitoring
US20230032109A1 (en) Remote sobriety monitoring systems, devices and methods
US20160267770A1 (en) Systems and Methods for Loose Monitoring of Targets
US9817948B2 (en) System and method for monitoring activities through portable devices
WO2016174206A1 (en) Location-based wireless diabetes management systems, methods and apparatus
US9811997B2 (en) Mobile safety platform
US9489819B2 (en) Personal monitor and tracking system
US11743685B2 (en) Systems and methods for monitoring system equipment diagnosis
CN112073573A (en) Reminding method and device applied to intelligent wearable device
US11701007B2 (en) Systems and methods for biometric tamper detection
AU2020102378A4 (en) MT-Family Member Activities and Location: FAMILY MEMBER ACTIVITIES AND LOCATION MANAGEMENT TECHNOLOGY
US20220051552A1 (en) Systems and Methods for Multi-Point Check-In Communication and Processing
US20200273554A1 (en) Systems and Methods for Medication Intake Monitoring
AU2022329968A1 (en) Facilitating adherence to tasks designed to maintain or improve health

Legal Events

Date Code Title Description
AS Assignment

Owner name: BI INCORPORATED, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUCK, JAMES J., JR;NEWELL, JOSEPH P.;PETTIT, DUSTIN;AND OTHERS;REEL/FRAME:053301/0970

Effective date: 20181210

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: ALTER DOMUS PRODUCTS CORP., AS ADMINISTRATIVE AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:B.I. INCORPORATED;BI MOBILE BREATH, INC.;REEL/FRAME:061373/0314

Effective date: 20220902

AS Assignment

Owner name: ANKURA TRUST COMPANY, CONNECTICUT

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:B.I. INCORPORATED;BI MOBILE BREATH, INC.;REEL/FRAME:061385/0939

Effective date: 20220902